Solved

Mapping network drive...

Posted on 2000-04-30
3
271 Views
Last Modified: 2010-04-11
I want to know how to map network drive on Windows 98.

For example, if my ip is 210.210.210.210, then \\210.210.210.210\$[shared folder name].

Isn't it wrong?

Thanks.
0
Comment
Question by:iamjhkang
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 12

Expert Comment

by:pjknibbs
ID: 2763366
UNC pathnames use the *name* of the machine, not its IP address. The $ is only used on NT, and then only for shares added by the operating system--user shares work the same as in 9x.

Therefore, if you have a machine called MyMachine, and there's a share on it called MyShare, you'd access this share using this path:

\\MyMachine\MyShare
0
 
LVL 4

Accepted Solution

by:
wlaarhov earned 30 total points
ID: 2763444
Pjknibbs:
What you told is not true, you absolutely don't need the name.
the command "net use \\10.10.10.1\share" works always and without any problem.
only the $ in jamjhkang's example was at the wrong place.
NT has standard a number of shares (c$ and Admin$) that you can use.
The $ sign makes the share hidden under NT, but are accesseble through NT.
0
 
LVL 1

Author Comment

by:iamjhkang
ID: 2763468
Thanks so much.
0

Featured Post

Free NetCrunch network monitor licenses!

Only on Experts-Exchange: Sign-up for a free-trial and we'll send you your permanent license!

Here is what you get: 30 Nodes | Unlimited Sensors | No Time Restrictions | Absolutely FREE!

Act now. This offer ends July 14, 2017.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question