Solved

Transfer files

Posted on 2002-06-13
4
188 Views
Last Modified: 2010-04-26
Can I transfer files from one computer to another (desktop to laptop) via a LAN cable? and if so, how?
0
Comment
Question by:jynx
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 31

Accepted Solution

by:
rid earned 50 total points
ID: 7075455
Assuming you have network adapters in both boxes, you can set them up as a "network" using a crossover network cable. For this exercise I would suggest using the NETBEUI protocol (win O/S assumed).

You may get more detailed help quicker if you submit more detail about your setup. As you see, I am assuming a few things in my comment. The quick answer would be "Yes" or possibly "No", depending on how a "LAN cable" is defined.

Regards
/RID
0
 
LVL 63

Assisted Solution

by:SysExpert
SysExpert earned 50 total points
ID: 7075954
0
 
LVL 1

Expert Comment

by:Piri
ID: 8959041
No comment has been added lately, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question is:
Split pts between rid and SysExpert
Please leave any comments here within the next seven days.
 
PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!
 
Piri
EE Cleanup Volunteer
0

Featured Post

Instantly Create Instructional Tutorials

Contextual Guidance at the moment of need helps your employees adopt to new software or processes instantly. Boost knowledge retention and employee engagement step-by-step with one easy solution.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Monitor input from a computer is usually nothing special.  In this instance it prevented anyone from using the computer.  This was a preconfiguration that didn't work.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question