Kludges are possible, but nothing that is bulletproof. To quote an old saying that I never understood, until now: "You can't have your cake and eat it, too." The real problem is that Windows Explorer and the application are both running in the user's security context, which controls the user's access to the file.
Dig Deeper on Enterprise Infrastructure Management
Related Q&A from Jerry Honeycutt
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.