How to restrict users on a Y2K network

Posted on 2003-02-19
Medium Priority
Last Modified: 2010-03-19
I have networked my computer with my brother-in-law so that his family can have access to my music, movies and games, but am uneasy about it because it appears that they can move files and delete. When I try to restrict access to modify it automatically selects to deny read & execute, list folders contents, read and write. What I am trying to do is to protect my file structure and still share the contents. I do have a firewall "Tiny Personal Firewall" but am new to both networking and the use of firewalls. I also have a built in firewall on my Belkin "4-port Cable/DSL Gateway Router", but the options that I find in the manual offer sharing as an all or nothing arrangement too.

Can I set it up so that they can look, listen and play but not change anything in my files on my end?

NOTE: Both computers are Windows 2000. I am the Administrator and he is a user in workgroup.
Question by:MadDatta
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
  • 2
  • +1

Expert Comment

ID: 7981941
You should be able to set "permissions" on the files so that you can restrict user access.  

if you right click on the directory that you are sharing you should see 3 tabs at the top.  General Sharing and Security.  You want to use Security.  Simply add the user < ur brother in law> and give him read and execute access.  You should also give him list access.  

if you have any problems with this email me at Mikeal@nospam.Infinithost.com remove the "nospam" to email.


Expert Comment

ID: 7983338
Yes, you need to restrict certain folders and subfolders.
It takes a little playing around with sometimes but you will get it right.
LVL 13

Expert Comment

ID: 7984058
When you networked it, how did you share the files in the first place?  By sharing all of drive 'C'?  ONLY share subfolders!  In the topmost shared subfolder, select the shares permissions.  (right-click, sharing, permissions)  Give 'everyone' full access.  The go out of the shares permissions to the regular NTFS permissions.  (right-click, properties, security)  Give 'everyone' read-only and list-contents permissions.  Make sure only you and 'system' keep full control.
Are You Using the Best Web Development Editor?

The worlds of web hosting and web development are constantly evolving. Every year we see design trends change, coding standards adapt and new frameworks/CMS created. With such a quick pace of change it’s easy to get lost trying to keep up.

See if your editor made the list.


Author Comment

ID: 7989107
No I am not sharing a whole drive. I am sharing about eight subfolders on three hard drives spanned across about five partitions. Within those folders are about eight hundred other lower root folders. In these folders are games that require installation into their own titled folders. Music categorized alphabetically and then by band, EX: "H:\My Music\~~D files\Dilbert McClinton\Dilbert McClinton - Stir it up.mp3" and "G:\My Music\~~O files\Otis Redding\Otis Redding - Stand by me.mp3" and so on and so on. And movies organized by type grouped in separate folders as well. I do want to share the subfolders and the lower root folders contained in them, but after three years of hard work getting everything organized and keeping it that way I don't want things moved or lost.

I tried the first suggestion but the moment I click the deny modify in "My Music-Properties-Security-Permissions: it automatically denies everything except for full control which includes "list folder contents" and "Read"

Is there a higher place to start in security settings with advanced options offered???

Thanks for help here...

Expert Comment

ID: 7993345
MadDatta i made the assumption that you were using a NTFS formated installation of windows 2000.  is it possible that you are using a FAT32 installation?

if so, to properly control user access, you will want to convert the drive over to NTFS.

LVL 13

Accepted Solution

magarity earned 150 total points
ID: 7995623
My Music-Properties-Security-Permissions

Unselect 'allow inheritable permissions from parent object to this object'

Agree to the warning with 'copy'.  Then ADD yourself and system.  Give yourself and system full access and 'everyone' read and list-contents.  When finished, use 'apply' instead of just OK.  Never forget about the system account when setting permissions!

Author Comment

ID: 7996446
Yea mikealcl, the reason for so many partitions is because I have two fat32 partitions on two of my disks for duel boot purposes. I would rather all NTFS, but have to keep WIN98 format for games for my children and thank you magarity because that worked.

My e-mail is Mad_Datta@cox.net if anyone needs anything or help from me...

Thanx all,

Featured Post

7 Extremely Useful Linux Commands for Beginners

Just getting started with Linux? Here's a quick start guide that has 7 commands that we believe will come in handy.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
This article explains the fundamentals of industrial networking which ultimately is the backbone network which is providing communications for process devices like robots and other not so interesting stuff.
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question