Go to file Use this template
kougyoku b3902b53a2 Update .gitignore 2022-04-21 16:42:26 -07:00
Properties initial commit 2022-04-21 13:00:27 -07:00
.gitignore Update .gitignore 2022-04-21 16:42:26 -07:00
App.config initial commit 2022-04-21 13:00:27 -07:00
LICENSE Initial commit 2022-04-21 03:48:20 +00:00
LocalExplorer.csproj initial commit 2022-04-21 13:00:27 -07:00
LocalExplorer.ico initial commit 2022-04-21 13:00:27 -07:00
LocalExplorer.sln initial commit 2022-04-21 13:00:27 -07:00
Program.cs Update Program.cs 2022-04-21 16:41:19 -07:00
README.md Update README.md 2022-04-21 13:15:53 -07:00
RegistryEntries.reg initial commit 2022-04-21 13:00:27 -07:00
test.html initial commit 2022-04-21 13:00:27 -07:00

README.md

LocalExplorer

IE 11 has a feature that allows users to click a URL to access file folders in local computer or network drive using Windows Explorer. Modern web browsers such as Edge and Chrome don't allow this to security measures.

This application was inspired by the "LocalExplorer" Chrome Plug-In and corresponding "integration module". (Source: http://vnprodev.com/browser-extensions/local-explorer-install.php )

The problem with this solution is that the Chrome plug-in can "read and change all your data on all websites", includes Google Analytics, collects debug info by default, and presents no EULA or terms of utilizing the software. The software was also home-brewed "in house" which the developer released free of charge but did not provide source code. This is a red flag for me in terms of security and gives me cause for concern with exactly how the program works and what it's doing.

So in response, I have created a clone of this software and am also releasing it free of charge, and open source since there is no alternative in the FOSS space. I hope this program provides useful to you. If it does, buy me a beer.

Installation

  1. Create the directory C:\LocalExplorer
  2. Drop the LocalExplorer.exe file into the above directory.
  3. Run the LocalExplorer.reg file to register the protocol handler.

As always you can verify exactly what the program is doing and what entries are being created in your registry by viewing the source code.