5.1

Table Of Contents
ThinApp User’s Guide
48 VMware, Inc.
Accessing the System Registry
By default, captured applications can read the full system registry as permitted by access permissions. Specific
parts of the registry are isolated from the system during the package creation process. This isolation reduces
conflicts between different versions of virtual applications and system-installed applications. By default,
ThinApp saves all registry modifications from captured applications in an isolated sandbox and the system
remains unchanged.
Accessing Networking and Sockets
Captured applications have standard access to networking features. Captured applications can bind to local
ports and make remote connections if the user has access permissions to perform these operations.
Using Shared Memory and Named Pipes
Captured applications can interact with other applications on the system by using shared memory, named
pipes, mutex objects, and semaphores.
ThinApp can isolate shared memory objects and synchronization objects. This isolation makes them invisible
to other applications, and other application objects are invisible to a captured application.
Using COM, DCOM, and Out-of-Process COM Components
Captured applications can create COM controls from the virtual environment and the system. If a COM
control is installed as an out-of-process COM, the control runs as a virtual process when a captured application
uses it. You can control modifications that the captured applications make.
Starting Services
Captured applications can start and run system-installed services and virtual services. System services run in
the virtual environment that controls the modifications that the services can make.
Using File Type Associations
Captured applications can run system-installed applications by using file type associations. You can add file
type associations to the local computer registry to point to captured executable files for individual users and
machines.
Network mapped drives By default, any user who has access rights can read or write to any
location on a network mapped disk.
UNC network paths By default, any user who has access rights can read or write to any
location on a UNC network path.
Table 3-2. Default Configuration Options (Continued)
Component Description