Solved

How to use ShellRunAs in Startup Folder

Posted on 2009-03-30
4
2,206 Views
Last Modified: 2013-12-04
Hello All-

I administer a Domain where I am the only Vista user.  I use the ShellRunAs app and love it!  It's exactly what I needed.  I do restart my machine daily and would like for a couple of programs to run automatically with different credentials.  Currently, once I get into Windows (Vista32), I right click on about 3 program's icons, choose the newly added "Run As Different User, type my admin credentials, then they load.  The easy answer would be to add these to the "Startup" folder or msconfig, but what switches do I need to put in the command line?

An example command line - let's say for iexpore.exe - would be great as well - Thanks!

Ben
0
Comment
Question by:BzowK
  • 4
4 Comments
 
LVL 14

Expert Comment

by:BigBadWolf_000
ID: 24021523
Usage: shellrunas [/reg | [/quietreg ] | /regnetonly [/quiet] | unreg | [/netonly] <program> <arguments>
/reg              Registers ShellRunas shell context-menu entry
/regnetonly Registers Shell /netonly context-menu entry
                     Note: a command prompt will flash when the program starts
/unreg         Unregisters ShellRunas shell context-menu  entry
/quiet           Register or unregisters ShellRunas shell context-menu entry without
                     result dialog
/netonly         Use if specified credentials are for remote access only
<program>   Runs program with specified credentials and parameters
0
 
LVL 14

Expert Comment

by:BigBadWolf_000
ID: 24021554
I believe ShellRunas does not accept parameters on the command-line for username and / or password.
0
 
LVL 14

Accepted Solution

by:
BigBadWolf_000 earned 500 total points
ID: 24021605
0
 
LVL 14

Expert Comment

by:BigBadWolf_000
ID: 24021626
Example...
psexec -u blah\blah -i c:\windows\system32\mmc.exe c:\windows\system32\dsa.msc
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

By this time the large percentage of day-to-day transactions have shifted to mobile banking; here are some overriding areas QAs must investigate while testing mobile banking apps.  
Big data transfers via information superhighways require special attention and protection. Learn more about the IT-regulations of the country where your server is located. Analyze cloud providers and their encryption systems for safe data transit. S…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
A simple description of email encryption using a secure portal service. This is one of the choices offered by The Email Laundry for email encryption. The other choices are pdf encryption which creates an encrypted pdf of your email and any attachmen…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now