Solved

Unsharing a Volume

Posted on 1999-01-14
7
344 Views
Last Modified: 2013-12-23
I have a situation that pops up from time to time.  A user may share a directory on their hard drive and then either get a new PC with a different name or is eliminated from the LAN.  How can I UNSHARE a volume from the PC of a user that was using that volume?  For example, John Doe left the company and subsequently took his PC.  John was sharing his C: drive with 20 people.  Now that John's pc is gone how can I from one of the 20 that was logging into John's shared volume stop the process.  On Jane's PC, when she logs on it asks for the password to John's shared volume and Jane just joined the circus.  How do I get rid of the NAG screen?
0
Comment
Question by:edfowler
7 Comments
 

Expert Comment

by:Tinkerer
ID: 1547780
That would mean that they have a drive maped to his now nonexistent system?
If the system is gone completly then with win95 it was not shared from his drive or it should not be asking you to log in.. is the lan win95 only?

If it is giving an error saying his system is unavilable then,
from Jane's system you need to go into the my computer icon and right click on the drive maped to his old system and click dissconnect...
0
 

Author Comment

by:edfowler
ID: 1547781
LAN is 90% WIN95.  In some cases the SHARER is available and in some case not.  Either way, I wish to unsubscribe, if you will, to a shared valume from the SHAREE.

At one time I knew the answer but have forgotten it.  I should not have to alter anything on either PC.
0
 

Expert Comment

by:boer5178
ID: 1547782
one thing that might help you out is if you go into your properties of your network neighborhood, you can select a option under your client for microsoft networks(I am assuming that your are concerned with just the peer to peer connections in your office) you will have something called log in and restore connections and quick login.  IF you select Quick login, it will not check if the computer is there, just assume that it is.  IT will not give that annoying message until you try to access the computer that is not there.

hope it helps

0
Portable, direct connect server access

The ATEN CV211 connects a laptop directly to any server allowing you instant access to perform data maintenance and local operations, for quick troubleshooting, updating, service and repair.

 

Author Comment

by:edfowler
ID: 1547783
Close, but not the answer I'm looking for.  Whether I have the Quick Logon selected or not does not offer me the opportunity to remove the computer from using another's shared volume.

Keep in mind, in a perfect world, as an IT Mngr. I am fully aware of all shares and therefore can unshare from the source or can confirm the share from the client then unmapp the drive.  Also, keep in mind, that in that same perfect world, my users remember all passwords and shares in the first place.  However, in the real world we just aren't that fortunate.

Thanks for the suggestion...you are closer than most thusfar.
0
 
LVL 3

Expert Comment

by:khemicals
ID: 1547784
right click on the connection and select disconnect, see if that does it
0
 

Accepted Solution

by:
diggz earned 70 total points
ID: 1547785
connect a computer with john doe's name in the ID tab of network properties. create all the directories that are virtually shared on john's machine. if they are automatically shared after creation, unshare them and you're all done. if they are not shared automatically, share them, and then unshare them.

so there.


0
 

Expert Comment

by:diggz
ID: 1547786
err..

virtually shared means something like the ghost-shared directories from john's old machine that keeps showing even if john's dead or whatever.

0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Sometimes you might need to configure routing based not only on destination IP address, but also on a combination of destination IP address (or hostname) and destination port number. I will describe a method how to accomplish this with free tools. …
A common practice in small networks is making file sharing easy which works extremely well when intra-network security is not an issue. In essence, everyone, that is "Everyone", is given access to all of the shared files - often the entire C: drive …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
This video shows how to quickly and easily add an email signature for all users on Exchange 2016. The resulting signature is applied on a server level by Exchange Online. The email signature template has been downloaded from: www.mail-signatures…

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question