{"id":141,"date":"2007-02-26T10:18:50","date_gmt":"2007-02-26T09:18:50","guid":{"rendered":"http:\/\/www.itwriting.com\/blog\/?p=141"},"modified":"2007-02-26T10:18:50","modified_gmt":"2007-02-26T09:18:50","slug":"peeking-into-vistas-virtual-store","status":"publish","type":"post","link":"https:\/\/www.itwriting.com\/blog\/141-peeking-into-vistas-virtual-store.html","title":{"rendered":"Peeking into Vista&#8217;s virtual store"},"content":{"rendered":"<p>In the user data area in Vista is a virtual store. Find it at:<\/p>\n<p>C:\\Users\\[USERNAME]\\AppData\\Local\\VirtualStore\\<\/p>\n<p>It is worth having a peek now and again. Here&#8217;s part of mine:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"298\" src=\"http:\/\/www.itwriting.com\/images\/virtualstore.gif\" height=\"455\" \/><\/p>\n<p>The Virtual Store is a feature of User Account Control, the centerpiece of Vista&#8217;s enhanced security. Applications that try to write to protected system locations, including Program Files, Windows, and HKEY_LOCAL_MACHINE in the registry, are prevented from doing so. Instead, a compatibility feature kicks in, and these applications write to a location in your home directory. Registry entries are written to a special area in HKEY_CURRENT_USER. The application mostly won&#8217;t know the difference, though there are limitations and you can get strange results. For example, if an application deletes a file from the virtual store when a file of the same name exists in the real location, the delete appears to succeed but the file still exists. Virtualization also fails (by design) if the application is run under another user account, or using Run As Administrator. The files written to the first user&#8217;s virtual store are invisible to these other users.<\/p>\n<p>Virtualization is a stop-gap measure. Well-behaved applications should not write to these locations except when first installed, or for maintenance, both of which are administrative tasks. So the Virtual Store is a hall of shame. Microsoft features heavily in mine; we can just about forgive the appearance of the beta\u00a0Expression tools, but Visual Foxpro 9.0? Adobe&#8217;s Flex Builder 2 is another disappointment. In most cases there are only one or two files, so we are not talking about major design issues, but they still need fixing.<\/p>\n<p>If you are developing software, it is worth\u00a0checking your virtual store in case stuff is slipping through. Note that you must have UAC enabled, and not be using Run As Administrator, since either of these settings will prevent the virtual store being used.<\/p>\n<p style=\"display: inline; margin: 0px; padding: 0px\" contentEditable=\"false\" id=\"0767317B-992E-4b12-91E0-4F059A8CECA8:a68251c0-322c-450b-8517-823393db8120\" class=\"wlWriterSmartContent\">Technorati tags: <a rel=\"tag\" href=\"http:\/\/technorati.com\/tags\/vista\">vista<\/a>, <a rel=\"tag\" href=\"http:\/\/technorati.com\/tags\/virtualstore\">virtualstore<\/a>, <a rel=\"tag\" href=\"http:\/\/technorati.com\/tags\/uac\">uac<\/a>, <a rel=\"tag\" href=\"http:\/\/technorati.com\/tags\/security\">security<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the user data area in Vista is a virtual store. Find it at: C:\\Users\\[USERNAME]\\AppData\\Local\\VirtualStore\\ It is worth having a peek now and again. Here&#8217;s part of mine: The Virtual Store is a feature of User Account Control, the centerpiece of Vista&#8217;s enhanced security. Applications that try to write to protected system locations, including Program &hellip; <a href=\"https:\/\/www.itwriting.com\/blog\/141-peeking-into-vistas-virtual-store.html\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Peeking into Vista&#8217;s virtual store<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[80,97],"tags":[],"class_list":["post-141","post","type-post","status-publish","format-standard","hentry","category-software-development","category-windows"],"_links":{"self":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/posts\/141","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":0,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/posts\/141\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/media?parent=141"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/categories?post=141"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/tags?post=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}