Solved

How to make a drive hidden?

Posted on 2001-07-05
7
869 Views
Last Modified: 2012-06-21
In my application is it forbidden that the user can change to a second physical drive during a special process, because i have made a hardware drive write block on that second drive.
Is it possible to make that drive with the write block hidden in explorer and other programs during that process?
0
Comment
Question by:scones
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 2

Expert Comment

by:pkohlmil
ID: 6257417
I don't think you can literally make it hidden but you could make it impossible to use Explorer or programs to access the disk by setting the permissions to "Deny" for that drive. You would do this after you have access in your application.
0
 

Author Comment

by:scones
ID: 6257815
Ok pkohlmil. First i will have access with my application and after that i will set the permissions to Deny for that drive. How can i do such a setting?
0
 
LVL 3

Accepted Solution

by:
CesarGon earned 100 total points
ID: 6259009
In Windows 2000, you can use the API calls SetVolumeMountPoint and DeleteVolumeMountPoint to remove a drive letter from a logical drive so it becames mostly inaccesible, and then re-assign it to it.

Ask for details if interested.
0
Creating Instructional Tutorials  

For Any Use & On Any Platform

Contextual Guidance at the moment of need helps your employees/users adopt software o& achieve even the most complex tasks instantly. Boost knowledge retention, software adoption & employee engagement with easy solution.

 

Author Comment

by:scones
ID: 6259135
I will solve the problem in Windows98.
I am looking for a solution for a scsi drive, not for IDE. Make that a difference?
0
 
LVL 4

Expert Comment

by:WolfgangKoenig
ID: 6259268
For the windows explorer the solution is following:

Hide Drives in My Computer (Windows 9x and NT)
This setting controls which drives are visible in 'My Computer', it is possible to hide all drives or just selected ones.

The value of 'NoDrives' defines which drives are visible. The low order (right most) bit is drive A: while the 26th bit is Drive Z: To hide a drive, turn on it's bit.

If your not happy working in Hex, add these decimal numbers to hide the drive(s):

A: 1, B: 2, C: 4, D: 8, E: 16, F: 32, G: 64, H: 128, I: 256, J: 512, K: 1024, L: 2048, M: 4096, N: 8192, O: 16384, P: 32768, Q: 65536, R: 131072, S: 262144, T: 524288, U: 1048576, V: 2097152, W: 4194304, X: 8388608, Y: 16777216, Z: 33554432, ALL: 67108863

Note: These drives will still appear in File Manager, to remove File Manager, delete winfile.exe.


Registry Settings:
Key: [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
Value Name: NoDrives
Data Type: REG_DWORD
 

Disclaimer: Modifying the registry can cause serious problems that may require you to reinstall your operating system. We cannot guarantee that problems resulting from the incorrect use of the registry can be solved. Use the information provided at your own risk.

Hope this helps
WoK
0
 
LVL 49

Expert Comment

by:DanRollins
ID: 7148147
Hi scones,
It appears that you have forgotten this question. I will ask Community Support to close it unless you finalize it within 7 days. I will ask a Community Support Moderator to:

    Accept CesarGon's comment(s) as an answer.

scones, if you think your question was not answered at all or if you need help, just post a new comment here; Community Support will help you.  DO NOT accept this comment as an answer.

EXPERTS: If you disagree with that recommendation, please post an explanatory comment.
==========
DanRollins -- EE database cleanup volunteer
0
 
LVL 1

Expert Comment

by:Computer101
ID: 7182057
Comment from expert accepted as answer

Computer101
E-E Moderator
0

Featured Post

[Webinar] How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction In a recent article (http://www.experts-exchange.com/A_7811-A-Better-Concatenate-Function.html) for the Excel community, I showed an improved version of the Excel Concatenate() function.  While writing that article I realized that no o…
Enums (shorthand for ‘enumerations’) are not often used by programmers but they can be quite valuable when they are.  What are they? An Enum is just a type of variable like a string or an Integer, but in this case one that you create that contains…
Get people started with the process of using Access VBA to control Outlook using automation, Microsoft Access can control other applications. An example is the ability to programmatically talk to Microsoft Outlook. Using automation, an Access applic…
Show developers how to use a criteria form to limit the data that appears on an Access report. It is a common requirement that users can specify the criteria for a report at runtime. The easiest way to accomplish this is using a criteria form that a…

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question