Go to file Use this template
kougyoku c0970aeb4e Update AssemblyInfo.cs
Increment to build 1.1
2022-05-09 11:09:50 -07:00
Properties Update AssemblyInfo.cs 2022-05-09 11:09:50 -07:00
.gitignore Update .gitignore 2022-04-21 16:42:26 -07:00
App.config initial commit 2022-04-21 13:00:27 -07:00
LICENSE Initial commit 2022-04-21 03:48:20 +00:00
LocalExplorer.csproj initial commit 2022-04-21 13:00:27 -07:00
LocalExplorer.ico initial commit 2022-04-21 13:00:27 -07:00
LocalExplorer.sln initial commit 2022-04-21 13:00:27 -07:00
Program.cs Change directory of program to C:\Windows\ISD\ 2022-04-28 10:01:15 -07:00
README.md Change directory of program to C:\Windows\ISD\ 2022-04-28 10:01:15 -07:00
RegistryEntries.reg Change directory of program to C:\Windows\ISD\ 2022-04-28 10:01:15 -07:00
test.html initial commit 2022-04-21 13:00:27 -07:00

LocalExplorer

IE 11 has a feature that allows users to click a URL to access file folders in local computer or network drive using Windows Explorer. Modern web browsers such as Edge and Chrome don't allow this to security measures.

This application was inspired by the "LocalExplorer" Chrome Plug-In and corresponding "integration module". (Source: http://vnprodev.com/browser-extensions/local-explorer-install.php )

The problem with this solution is that the Chrome plug-in can "read and change all your data on all websites", includes Google Analytics, collects debug info by default, and presents no EULA or terms of utilizing the software. The software was also home-brewed "in house" which the developer released free of charge but did not provide source code. This is a red flag for me in terms of security and gives me cause for concern with exactly how the program works and what it's doing.

So in response, I have created a clone of this software and am also releasing it free of charge, and open source since there is no alternative in the FOSS space. I hope this program provides useful to you. If it does, buy me a beer.

Installation

Run the below steps as administrator.

  1. Drop the LocalExplorer.exe file into the C:\Windows\ISD\ directory so that the full path is C:\Windows\ISD\LocalExplorer.exe
  2. Run the LocalExplorer.reg file to register the protocol handler.

As always you can verify exactly what the program is doing and what entries are being created in your registry by viewing the source code.