What would cause a Visual Studio 2008 .sln to become unopenable to all but one user?

Posted on 2011-02-10
Last Modified: 2012-05-11
I created a web app in Visual Studio 2008 on my work computer when I was logged in as myself. The project folder is saved on our server so that it can be accessed by any of our few employees. Later, one of my coworkers logged on as herself to a different computer and worked with the web app. She published the web app through our server's ftp site to test that it worked. Ever since then no one else is able to even open the solution, regardless of what computer they are logged into. If she is logged in, all is fine, but if someone else is logged in and tries to open the solution in Visual Studio 2008 it results in the error, "Not a valid solution file", and even trying to open the .sln file in Notepad results in an "Access is denied" error.

What could have caused this sort of "protection" to the .sln file? Why is it that only she is able to access it now? And most importantly, how can we fix this so that I am able to access and edit the web app again? Any suggestions would be much appreciated.

We've already checked the obvious--the properties of the .sln file do not indicate that anyone shouldn't be allowed to access or edit it. Thanks in advance.
Question by:jnelson219
  • 3
  • 3

Expert Comment

ID: 34865666
If you are correct and no one is denied access, there are two things that I can immediately think of: 1- networking sharing permissions (different from ntfs permissions) and 2- a lock file. Check for those two.

Author Comment

ID: 34866472
Thanks for the response, Precifijo. All of us are administrators, so we all have the same networking sharing permissions. We also ran a program called "Unlocker" on the file to check that it isn't locked by another user. It came back clean, saying that "no lock handles" were found.

Expert Comment

ID: 34866751
What about the permissions settings on the ftp site itself? have you checked there?
Does Powershell have you tied up in knots?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why


Accepted Solution

jnelson219 earned 0 total points
ID: 34866859
The problem was that the file was encrypted. I don't know why this was the case, but we were able to click properties, Advanced, and then uncheck the box for "Encrypt data to secure contents". Thanks for your help, though.

Expert Comment

ID: 34866871
I'm just glad you got the problem solved. :-)

Author Closing Comment

ID: 34895075
We figured out the answer on our own. We should have mentioned in our posting that the file name was green in Windows Explorer, thus indicating an encrypted file.

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Scheduled IIS .Net2 AppPools recycle and SQL connection Hangs 33 113
Server Error 11 58
convert html to string 6 34
asp day pilot 3 19
A quick way to get a menu to work on our website, is using the Menu control and assign it to a web.sitemap using SiteMapDataSource. Example of web.sitemap file: (CODE) Sample code to add to the page menu: (CODE) Running the application, we wi…
International Data Corporation (IDC) prognosticates that before the current the year gets over disbursing on IT framework products to be sent in cloud environs will be $37.1B.
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question