Solved

Access to Microsoft PWS 4.0

Posted on 1998-03-29
8
190 Views
Last Modified: 2013-12-25
How can I set the permissions in Microsoft Personal Weber Server 4.0 so I can access its web sites via a modem? The help file for this aspect is none existent. There is a file called access.cnf which only has one line in it.  
0
Comment
Question by:pcolley
  • 3
  • 2
  • 2
  • +1
8 Comments
 
LVL 3

Expert Comment

by:bigelos
Comment Utility
You need to set up your computer to share files over a network connection.  Not positive on this one, but I'm pretty sure it requires TCP-IP protocol.  Also need to set it up for remote Dial-Up access using the proper protocols.

On the calling computer, you need to have the same network protocol installed and properly configured.
0
 
LVL 3

Expert Comment

by:percyn
Comment Utility
This really does not have much to do with PWS, but more with being able to access the PWS server from another machine/LAN.

As long as you can make a HTTP request from one computer/lan to this server, you are fine. Now, in order to make an HTTP request, you need TCP/IP (or it's derivatives, like PPP, PPTP, etc). How you go about doing that depends on your network configuration.
0
 
LVL 3

Expert Comment

by:percyn
Comment Utility
Why did you reject this answer ? It is the truth...
0
 

Author Comment

by:pcolley
Comment Utility
So far none of the answers have helped.  Let me start again.  I have PWS 4.0 installed on an office computer connected to the internet.  It constructs its own "root web."  From home or anywhere else, I can see the "root web" with a browser as I know the computers IP address.  But I want to be able to edit the "root web" with Frontpage 98 from my home.  When I try to open the "root web with FP98 I get an "error 403" which I gather is "access denied."  How can I edit this "root web" with FP98? I don't seem to have any problems doing this if the remote computer has PWS 1.0.
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 3

Expert Comment

by:percyn
Comment Utility
Have you setup permissions correctly in FP and its extensions ?
0
 
LVL 3

Accepted Solution

by:
hkp earned 100 total points
Comment Utility
Are we talking about Windows NT Domain Model?

If this is the case, make a local group on the resource (in this case the computer with the "root web". This can be done by using "User Manager" or "User Manager for Domains".


Make a global group on a domain controller (PDC or BDC).

Enter the global group into the local group on the "root web" machine. This way you have access to the resource from the whole domain.

From the Peer Web Server, assign the necessary permissions (eg. Full Control) to the local group (you just created!) - Make sure, the local group have the "write" permission set on the "root web"


0
 

Author Comment

by:pcolley
Comment Utility
Great answer but unfortunately I'm using Windows 95 and not Windows NT.  I should have specified.  Perhas hkp could tell me how to do this under Windows 95?


0
 
LVL 3

Expert Comment

by:hkp
Comment Utility
I would like to, but I have only small experience with Windows 95. Perhaps, the answer could be lying in the installation of "Internet Connection Services for RAS", which should be installed under the Customs option when installing PWS.

Good luck, and thanks.
0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Popularity Can Be Measured Sometimes we deal with questions of popularity, and we need a way to collect opinions from our clients.  This article shows a simple teaching example of how we might elect a favorite color by letting our clients vote for …
Password hashing is better than message digests or encryption, and you should be using it instead of message digests or encryption.  Find out why and how in this article, which supplements the original article on PHP Client Registration, Login, Logo…
This tutorial walks through the best practices in adding a local business to Google Maps including how to properly search for duplicates, marker placement, and inputing business details. Login to your Google Account, then search for "Google Mapmaker…
The viewer will get a basic understanding of what section 508 compliance can entail, learn about skip navigation links, alt text, transcripts, and font size controls.

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

7 Experts available now in Live!

Get 1:1 Help Now