Solved

Telnet Server With Restriction

Posted on 2002-07-05
4
163 Views
Last Modified: 2011-10-03
Hi All, :)
I want to deploy Telnet Server on my File Server in my Office. The usage of the telnet server is allowing user to do execution for some pre-copied executable files on specified folder on the file server remotely.
I would not allow the user move out from the specified folder using cd .. or cd\ because there are confidential data on the server. But they are allowed to create folder inside and walking through the sub-folder.
I would not allow too the user to execute other executable files then pre-copied files.
I don't know if I can accomplish the goal using Microsoft Telnet server or another application/software. I need your help if you have information about this.

Thank you.

Halomoan


0
Comment
Question by:Imelda
  • 3
4 Comments
 
LVL 7

Expert Comment

by:jmiller47
ID: 7133308
You should be able to do this just by using NTFS permissions. Only allow the users to get to the files and directories specified.

I hope this helps
0
 
LVL 7

Accepted Solution

by:
jmiller47 earned 100 total points
ID: 7133313
Yes. It works. Just deny read or execute permissions to the user on the directories they are not allowed to access.
0
 

Author Comment

by:Imelda
ID: 7145397
Yes, it's work.
Thank you
0
 
LVL 7

Expert Comment

by:jmiller47
ID: 7161268
Good! Glad to hear it!
0

Featured Post

Highfive + Dolby Voice = No More Audio Complaints!

Poor audio quality is one of the top reasons people don’t use video conferencing. Get the crispest, clearest audio powered by Dolby Voice in every meeting. Highfive and Dolby Voice deliver the best video conferencing and audio experience for every meeting and every room.

Join & Write a Comment

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Scam emails are a huge burden for many businesses. Spotting one is not always easy. Follow our tips to identify if an email you receive is a scam.
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now