?
Solved

How to restrict users on a Y2K network

Posted on 2003-02-19
7
Medium Priority
?
325 Views
Last Modified: 2010-03-19
I have networked my computer with my brother-in-law so that his family can have access to my music, movies and games, but am uneasy about it because it appears that they can move files and delete. When I try to restrict access to modify it automatically selects to deny read & execute, list folders contents, read and write. What I am trying to do is to protect my file structure and still share the contents. I do have a firewall "Tiny Personal Firewall" but am new to both networking and the use of firewalls. I also have a built in firewall on my Belkin "4-port Cable/DSL Gateway Router", but the options that I find in the manual offer sharing as an all or nothing arrangement too.

Can I set it up so that they can look, listen and play but not change anything in my files on my end?

NOTE: Both computers are Windows 2000. I am the Administrator and he is a user in workgroup.
0
Comment
Question by:MadDatta
  • 2
  • 2
  • 2
  • +1
7 Comments
 
LVL 7

Expert Comment

by:Mikealcl
ID: 7981941
You should be able to set "permissions" on the files so that you can restrict user access.  

if you right click on the directory that you are sharing you should see 3 tabs at the top.  General Sharing and Security.  You want to use Security.  Simply add the user < ur brother in law> and give him read and execute access.  You should also give him list access.  

if you have any problems with this email me at Mikeal@nospam.Infinithost.com remove the "nospam" to email.

 
0
 

Expert Comment

by:woriar3
ID: 7983338
Yes, you need to restrict certain folders and subfolders.
It takes a little playing around with sometimes but you will get it right.
0
 
LVL 13

Expert Comment

by:magarity
ID: 7984058
When you networked it, how did you share the files in the first place?  By sharing all of drive 'C'?  ONLY share subfolders!  In the topmost shared subfolder, select the shares permissions.  (right-click, sharing, permissions)  Give 'everyone' full access.  The go out of the shares permissions to the regular NTFS permissions.  (right-click, properties, security)  Give 'everyone' read-only and list-contents permissions.  Make sure only you and 'system' keep full control.
0
The new generation of project management tools

With monday.com’s project management tool, you can see what everyone on your team is working in a single glance. Its intuitive dashboards are customizable, so you can create systems that work for you.

 

Author Comment

by:MadDatta
ID: 7989107
No I am not sharing a whole drive. I am sharing about eight subfolders on three hard drives spanned across about five partitions. Within those folders are about eight hundred other lower root folders. In these folders are games that require installation into their own titled folders. Music categorized alphabetically and then by band, EX: "H:\My Music\~~D files\Dilbert McClinton\Dilbert McClinton - Stir it up.mp3" and "G:\My Music\~~O files\Otis Redding\Otis Redding - Stand by me.mp3" and so on and so on. And movies organized by type grouped in separate folders as well. I do want to share the subfolders and the lower root folders contained in them, but after three years of hard work getting everything organized and keeping it that way I don't want things moved or lost.

I tried the first suggestion but the moment I click the deny modify in "My Music-Properties-Security-Permissions: it automatically denies everything except for full control which includes "list folder contents" and "Read"

Is there a higher place to start in security settings with advanced options offered???

Thanks for help here...
Dave
0
 
LVL 7

Expert Comment

by:Mikealcl
ID: 7993345
MadDatta i made the assumption that you were using a NTFS formated installation of windows 2000.  is it possible that you are using a FAT32 installation?

if so, to properly control user access, you will want to convert the drive over to NTFS.

Mikeal
0
 
LVL 13

Accepted Solution

by:
magarity earned 150 total points
ID: 7995623
My Music-Properties-Security-Permissions
then:

Unselect 'allow inheritable permissions from parent object to this object'

Agree to the warning with 'copy'.  Then ADD yourself and system.  Give yourself and system full access and 'everyone' read and list-contents.  When finished, use 'apply' instead of just OK.  Never forget about the system account when setting permissions!
0
 

Author Comment

by:MadDatta
ID: 7996446
Yea mikealcl, the reason for so many partitions is because I have two fat32 partitions on two of my disks for duel boot purposes. I would rather all NTFS, but have to keep WIN98 format for games for my children and thank you magarity because that worked.

My e-mail is Mad_Datta@cox.net if anyone needs anything or help from me...

Thanx all,
Mad_Datta
0

Featured Post

The new generation of project management tools

With monday.com’s project management tool, you can see what everyone on your team is working in a single glance. Its intuitive dashboards are customizable, so you can create systems that work for you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

WARNING:   If you follow the instructions here, you will wipe out your VTP and VLAN configurations.  Make sure you have backed up your switch!!! I recently had some issues with a few low-end Cisco routers (RV325) and I opened a case with Cisco TA…
In this article I will be showing you how to subnet the easiest way possible for IPv4 (Internet Protocol version 4). This article does not cover IPv6. Keep in mind that subnetting requires lots of practice and time.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

598 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question