Solved

How to hide folders from other local users?

Posted on 2001-08-16
7
183 Views
Last Modified: 2010-04-13
On W2K I'd like to share my lap top from time to time with friends, but I'd also like to keep folders and documents on there that I do not want them to have access to.  I can be Administrator and let them be a user, but I notice that logging in as this user I still have access to all the folders and data I created when logged in as Administrator.  How can I construct a "Chinese Wall" between the users and myself, so that my folders cannot be opened, and preferably can't even be seen?

Thanks,

steva
0
Comment
Question by:steva
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 9

Accepted Solution

by:
schmiegu earned 50 total points
ID: 6396190
Right click the folder, select the security tab and uncheck "Allow inheritable permission....". If prompted, select copy. Then remove the everyone group and - if listed - the users group, so that only administrators ans SYSTEM have full access (if they're not already there, you have to add them - not absolutely necessary, but good practice) and you may add your personal account here, if you're not a member of the administrators group.
0
 
LVL 4

Assisted Solution

by:arminl
arminl earned 50 total points
ID: 6396407
You can either use NTFS permissions, but if you borrow your notebook to someone else there may always be a chance that he calls you and urgently needs admin privileges to do something RIGHT NOW.

The better option is to make use of the new EFS (Encrypting File System) feature: bring up the affected files or the folders containing them and set the "encrypted" attribute. (RightMose Click, Select Attributes button) Nobody but yourself and the local administrator (domain dministrator if you are a member of a domain) will be able to read that files any more, not even using hacking tools that circumvent NTFS security.

Note that for emergencies you should use the certificates snap in in the MMC and export the file recovery key of the administrator account onto a floppy.

Armin Linder
0
 

Author Comment

by:steva
ID: 6398189
I notice that my Lap top  file system is FAT32, so I don't see the security tab when I right click a folder.  I suspect that the EFS idea above  is also going to require NTFS.

I have plenty of space (20G) on this disk, so I need to figure out how to break off a piece of this  FAT32 partition and make it a separate NTFS partition,  and then I'll experiment with your ideas.

You guys have both been helpful.  How do I spit the points between both comments?

Thanks,

steva

0
Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

 
LVL 4

Expert Comment

by:arminl
ID: 6403875
No file encryting EFS nor NTFS permissions on FAT32 :-(

You need to convert the drive to NTFS. Now if NT is the only OS you run there isn't any problem doing so, just type

convert c: /fs:ntfs

at the command line and reboot. The file system will be converted automatically. You won't loose any data (hopefully. Since this is a pretty dangerous situation for your data I suggest that you make a backup copy if you can).

Without NTFS there isn't a standard way to protect files, but you can always use third party encrypting software, or compression or archiving software like WinZip that allows for file encryption.

Another way I can think of: if your harddisk is large enough you could create an additional D: partition and format it using NTFS and then make use of permissions and/or file encryption. This way you keep FAT32 on C: giving you backward compatibility if you need to dual-boot with Windows 9x or ME.

Armin Linder
0
 
LVL 5

Expert Comment

by:cempasha
ID: 8444457
Hi steva
This question is still open and needs to be closed. If any of the comments above helped you, please accept it as an answer. If not please send an update about your issue so that the question can be finalised. Thank you

*** PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER ***

Pasha

Cleanup Volunteer
0
 
LVL 1

Expert Comment

by:netwiz562
ID: 8860060
------CLEAN UP------

No comment has been added lately, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question is:

RECOMMENDATION: Split points between schmiegu & arminl.

Please leave any comments here within the next seven days.

~~PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!~~

Rajiv Makhijani
EE Cleanup Volunteer

0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
This article describes how to import Lotus Notes Contacts into Outlook 2016, 2013, 2010 and 2007 etc. with a few manual steps. You can easily export and migrate Lotus Notes contacts into Microsoft Outlook without having to use any third party tools.
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
Visualize your data even better in Access queries. Given a date and a value, this lesson shows how to compare that value with the previous value, calculate the difference, and display a circle if the value is the same, an up triangle if it increased…

630 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question