Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Visual Studio and SourceSafe.

Posted on 2014-04-16
1
Medium Priority
?
395 Views
Last Modified: 2014-05-14
Hi,

when I load solution in Visual Studio 2008 and edit files, they automatically checked out from SourceSafe source control.
Anyone knows how to disable this functionality?

Thanks.
0
Comment
Question by:quasar_ee
1 Comment
 
LVL 8

Accepted Solution

by:
deepu chandran earned 1500 total points
ID: 40004621
HI,

That is the Expected Behaviour by all Source Controls, it should show as Checked out then only you can check in your changes.

If you are looking for a solution only for study or Testing then you can refer the below link for "removing source safe binding". Now you can modify the code as you wish

stackoverflow.com/questions/9706315/permanently-remove-solution-from-sourcesafe  

Hope this is what you are looking for
Thanks
Deepu
0

Featured Post

NEW Veeam Backup for Microsoft Office 365 1.5

With Office 365, it’s your data and your responsibility to protect it. NEW Veeam Backup for Microsoft Office 365 eliminates the risk of losing access to your Office 365 data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wouldn’t it be nice if you could test whether an element is contained in an array by using a Contains method just like the one available on List objects? Wouldn’t it be good if you could write code like this? (CODE) In .NET 3.5, this is possible…
This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an anti-spam), the admin…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…
Suggested Courses

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question