Solved

Experience with ShareWay IP

Posted on 1998-12-12
6
258 Views
Last Modified: 2013-11-13
Has enyone experience with ShareWay Ip from Open Door Networks. I'm planning to use it for remote Acces over IP and for speeding up datatranfer for the 10 baseT Macs by using it on a 100 baseTX Mac. Or should I better wait for Windows NT 5?
0
Comment
Question by:bennetje
  • 4
6 Comments
 
LVL 6

Expert Comment

by:TheHub
ID: 1581541
I do not have a clear understanding of what you want to do. Please provide more info about the topology of your network(s).
0
 
LVL 6

Expert Comment

by:TheHub
ID: 1581542
Of course, you can connect to AppleShare IP servers with a dialup PPP connection using the Chooser Extension "AppleShare" (version 3.7.4 or Greater) by typing in the IP addr of the Server provided that you have TCP hole through the router.
0
 
LVL 6

Expert Comment

by:TheHub
ID: 1581543
The above solution requires no extra software.
0
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

 

Author Comment

by:bennetje
ID: 1581544
For the firt question the Hub gave a satifying answer.
For the second question - if ShareWay could be used as the solution to use TCP/IP as the protocol to transfer data to and from the NT-server with the Apple clients - I'm not sure.
I'm afraid that if I use one fast Mac as AppleShare to TCP/IP router with 20 clients I will slow down all the datatransfer.
0
 
LVL 2

Expert Comment

by:jkjung
ID: 1581545
I was just about to try ShareWay IP.  I will let you know by the end of the week, whether it does what I want it to do (and hopefully, answer your question).

I hope this helps.

--MikroData
0
 
LVL 6

Accepted Solution

by:
TheHub earned 100 total points
ID: 1581546
Of course, you can connect to AppleShare IP servers with a dialup PPP connection using the Chooser Extension "AppleShare" (version 3.7.4 or Greater) by typing in the IP addr of the Server provided that you have TCP hole through the router.

repetition is the key to understanding...:)
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

SUMMARY Enterprise backup in a heterogeneous network is a subject full of complications and restrictions. Issues such as filename & path structure, attributes and extended metadata always tend to complicate the subject to the extent where either …
In this article we will discuss some EI Capitan Mail app issues and provide some manual process to resolve them.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now