Solved

How to use ShellRunAs in Startup Folder

Posted on 2009-03-30
4
2,240 Views
Last Modified: 2013-12-04
Hello All-

I administer a Domain where I am the only Vista user.  I use the ShellRunAs app and love it!  It's exactly what I needed.  I do restart my machine daily and would like for a couple of programs to run automatically with different credentials.  Currently, once I get into Windows (Vista32), I right click on about 3 program's icons, choose the newly added "Run As Different User, type my admin credentials, then they load.  The easy answer would be to add these to the "Startup" folder or msconfig, but what switches do I need to put in the command line?

An example command line - let's say for iexpore.exe - would be great as well - Thanks!

Ben
0
Comment
Question by:BzowK
  • 4
4 Comments
 
LVL 14

Expert Comment

by:BigBadWolf_000
ID: 24021523
Usage: shellrunas [/reg | [/quietreg ] | /regnetonly [/quiet] | unreg | [/netonly] <program> <arguments>
/reg              Registers ShellRunas shell context-menu entry
/regnetonly Registers Shell /netonly context-menu entry
                     Note: a command prompt will flash when the program starts
/unreg         Unregisters ShellRunas shell context-menu  entry
/quiet           Register or unregisters ShellRunas shell context-menu entry without
                     result dialog
/netonly         Use if specified credentials are for remote access only
<program>   Runs program with specified credentials and parameters
0
 
LVL 14

Expert Comment

by:BigBadWolf_000
ID: 24021554
I believe ShellRunas does not accept parameters on the command-line for username and / or password.
0
 
LVL 14

Accepted Solution

by:
BigBadWolf_000 earned 500 total points
ID: 24021605
0
 
LVL 14

Expert Comment

by:BigBadWolf_000
ID: 24021626
Example...
psexec -u blah\blah -i c:\windows\system32\mmc.exe c:\windows\system32\dsa.msc
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The next five years are sure to bring developments that are just astonishing, and we will continue to try to find the balance between connectivity and security. Here are five major technological developments from the last five years and some predict…
Do you know what to look for when considering cloud computing? Should you hire someone or try to do it yourself? I'll be covering these questions and looking at the best options for you and your business.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

697 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question