Solved

How to use ShellRunAs in Startup Folder

Posted on 2009-03-30
4
2,192 Views
Last Modified: 2013-12-04
Hello All-

I administer a Domain where I am the only Vista user.  I use the ShellRunAs app and love it!  It's exactly what I needed.  I do restart my machine daily and would like for a couple of programs to run automatically with different credentials.  Currently, once I get into Windows (Vista32), I right click on about 3 program's icons, choose the newly added "Run As Different User, type my admin credentials, then they load.  The easy answer would be to add these to the "Startup" folder or msconfig, but what switches do I need to put in the command line?

An example command line - let's say for iexpore.exe - would be great as well - Thanks!

Ben
0
Comment
Question by:BzowK
  • 4
4 Comments
 
LVL 14

Expert Comment

by:BigBadWolf_000
ID: 24021523
Usage: shellrunas [/reg | [/quietreg ] | /regnetonly [/quiet] | unreg | [/netonly] <program> <arguments>
/reg              Registers ShellRunas shell context-menu entry
/regnetonly Registers Shell /netonly context-menu entry
                     Note: a command prompt will flash when the program starts
/unreg         Unregisters ShellRunas shell context-menu  entry
/quiet           Register or unregisters ShellRunas shell context-menu entry without
                     result dialog
/netonly         Use if specified credentials are for remote access only
<program>   Runs program with specified credentials and parameters
0
 
LVL 14

Expert Comment

by:BigBadWolf_000
ID: 24021554
I believe ShellRunas does not accept parameters on the command-line for username and / or password.
0
 
LVL 14

Accepted Solution

by:
BigBadWolf_000 earned 500 total points
ID: 24021605
0
 
LVL 14

Expert Comment

by:BigBadWolf_000
ID: 24021626
Example...
psexec -u blah\blah -i c:\windows\system32\mmc.exe c:\windows\system32\dsa.msc
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

Suggested Solutions

It’s a strangely common occurrence that when you send someone their login details for a system, they can’t get in. This article will help you understand why it happens, and what you can do about it.
Big data transfers via information superhighways require special attention and protection. Learn more about the IT-regulations of the country where your server is located. Analyze cloud providers and their encryption systems for safe data transit. S…
The Task Scheduler is a powerful tool that is built into Windows. It allows you to schedule tasks (actions) on a recurring basis, such as hourly, daily, weekly, monthly, at log on, at startup, on idle, etc. This video Micro Tutorial is a brief intro…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now