Solved

Network access

Posted on 2003-10-28
6
201 Views
Last Modified: 2013-11-15
how would i access other computers on the network, no idea what server we using at the moment, is it possible or not, or do u need more info.
0
Comment
Question by:Yogispree
  • 2
6 Comments
 
LVL 31

Expert Comment

by:qwaletee
ID: 9633556
Wow!  We're really starting from basics here.

What do you want to access -- files on other computers?  You would have o know what you are trying to get to, unles you are "just browsing."  In a corporate environment, "just browsing" often doesn't lead to much.

IN Windows, go t My Network Places, and just explore from there.
0
 
LVL 18

Expert Comment

by:liddler
ID: 9633580
Lots more info.
What operating system you have, and the servers operating system.  How you both connect to the server both phyiscally (wireless, DSL, CAT5) and protocol (TCP/IP, NetBUI, IPX)
Are you part of a domain, workgroup, NDS tree, LDAP?
Do you have an account on the server?
The more details the better
0
 

Author Comment

by:Yogispree
ID: 9633623
Firstly im no computer fundi or anything, when i go to 'my network places' i then go to 'computers near me' and then all the computers come up, but when i type the username and password, 'printers' and 'scheduled tasks' come up, but these are useless to me, how would i connect to their c:. How would i go about getting the other info. My pc has windows 2000 professional , no idea what server is using, as for the other info, no idea. Hate to think im starting from basics but guess i am. please help..........
0
 
LVL 18

Accepted Solution

by:
liddler earned 125 total points
ID: 9633765
OK,
The server only has printer and schedules tasks shared.  You will have to ask to server admin to share the C: drive, and allow your username / password access to it
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If your business is like most, chances are you still need to maintain a fax infrastructure for your staff. It’s hard to believe that a communication technology that was thriving in the mid-80s could still be an essential part of your team’s modern I…
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
This tutorial will walk an individual through locating and launching the BEUtility application to properly change the service account username and\or password in situation where it may be necessary or where the password has been inadvertently change…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now