Solved

Unsharing a Volume

Posted on 1999-01-14
7
312 Views
Last Modified: 2013-12-23
I have a situation that pops up from time to time.  A user may share a directory on their hard drive and then either get a new PC with a different name or is eliminated from the LAN.  How can I UNSHARE a volume from the PC of a user that was using that volume?  For example, John Doe left the company and subsequently took his PC.  John was sharing his C: drive with 20 people.  Now that John's pc is gone how can I from one of the 20 that was logging into John's shared volume stop the process.  On Jane's PC, when she logs on it asks for the password to John's shared volume and Jane just joined the circus.  How do I get rid of the NAG screen?
0
Comment
Question by:edfowler
7 Comments
 

Expert Comment

by:Tinkerer
ID: 1547780
That would mean that they have a drive maped to his now nonexistent system?
If the system is gone completly then with win95 it was not shared from his drive or it should not be asking you to log in.. is the lan win95 only?

If it is giving an error saying his system is unavilable then,
from Jane's system you need to go into the my computer icon and right click on the drive maped to his old system and click dissconnect...
0
 

Author Comment

by:edfowler
ID: 1547781
LAN is 90% WIN95.  In some cases the SHARER is available and in some case not.  Either way, I wish to unsubscribe, if you will, to a shared valume from the SHAREE.

At one time I knew the answer but have forgotten it.  I should not have to alter anything on either PC.
0
 

Expert Comment

by:boer5178
ID: 1547782
one thing that might help you out is if you go into your properties of your network neighborhood, you can select a option under your client for microsoft networks(I am assuming that your are concerned with just the peer to peer connections in your office) you will have something called log in and restore connections and quick login.  IF you select Quick login, it will not check if the computer is there, just assume that it is.  IT will not give that annoying message until you try to access the computer that is not there.

hope it helps

0
Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

 

Author Comment

by:edfowler
ID: 1547783
Close, but not the answer I'm looking for.  Whether I have the Quick Logon selected or not does not offer me the opportunity to remove the computer from using another's shared volume.

Keep in mind, in a perfect world, as an IT Mngr. I am fully aware of all shares and therefore can unshare from the source or can confirm the share from the client then unmapp the drive.  Also, keep in mind, that in that same perfect world, my users remember all passwords and shares in the first place.  However, in the real world we just aren't that fortunate.

Thanks for the suggestion...you are closer than most thusfar.
0
 
LVL 3

Expert Comment

by:khemicals
ID: 1547784
right click on the connection and select disconnect, see if that does it
0
 

Accepted Solution

by:
diggz earned 70 total points
ID: 1547785
connect a computer with john doe's name in the ID tab of network properties. create all the directories that are virtually shared on john's machine. if they are automatically shared after creation, unshare them and you're all done. if they are not shared automatically, share them, and then unshare them.

so there.


0
 

Expert Comment

by:diggz
ID: 1547786
err..

virtually shared means something like the ghost-shared directories from john's old machine that keeps showing even if john's dead or whatever.

0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

We recently endured a series of broadcast storms that caused our ISP to shut us down for brief periods of time. After going through a multitude of tests, we determined that the issue was related to Intel NIC drivers on some new HP desktop computers …
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
This tutorial demonstrates a quick way of adding group price to multiple Magento products.

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now