Extract MultiPowUpload distribution package on a web server:
Open Windows Explorer IIS server's root folder (by default it is c:\Inetpub\wwwroot\).
Extract MultiPowUpload zip archive to the new MultiPowUpload folder inside the root folder. We use the root and the name as default in this manual, but you can use any name for the folder or place it into another root. Screenshot
Create "Application" at IIS:
Open IIS console: Control panel->Administrative tools->
Internet Information Services->Expand "Default web site"
For IIS 5 and 6: Expand MultiPowUpload->FileProcessingScripts->ASP.NET node, right-click the "CSharp" node and select "Properties" in the context menu.
In the CSharp properties dialog box, open "Directory" tab and click Create button next to the Application name field. Screenshot
For IIS7: Expand MultiPowUpload->FileProcessingScripts->ASP.NET node, right-click the "CSharp" node and select "Convert to Application" in the context menu.
Click "ok" in the new dialog box. Screenshot
Be sure that other programmes that use this application pool have the same .NET framework version. Different versions of .NET in the same pool will cause an error!
Check that .NET 2.0 or 3.5 enabled for the application (only for IIS 5 or 6):
Open IIS console: Control panel->Administrative tools->
Internet Information Services->Expand "Default web site". Expand MultiPowUpload->FileProcessingScripts->ASP.NET node, right-click the "CSharp" node and select "Properties" in the context menu.
In the "CSharp" properties dialog box, open "ASP.NET" tab, make sure that value 2.0.xx or 3.5.xx is selected in the ASP.NET version fileld. Screenshot
Check NTFS permissions for "FileProcessingScripts\ASP.NET\CSharp\UploadedFiles" folder
By default ASP.NET application works under NETWORK SERVICE user in IIS6 and IIS7 (or under ASPNET user in IIS5).
You should set NTFS "Write", "Read and execute", "Read", "List folders content" permissions for NETWORK SERVICE user (or ASPNET user in IIS5) to the "UploadedFiles" folder.
Set the same permissions to the web.config files in all top level folders (like c:\Inetpub\wwwroot\web.config) as well! Screenshot
Open the http://localhost/MultiPowUpload/index.htm link in your browser to see some samples.
Note! Remember that the UploadedFiles folder is a potential source of vulnerability, therefore always prohibit scripts execution in it in the server settings, otherwise intruders can upload and execute malicious script.