?
Solved

XP to XP authentication...

Posted on 2003-11-06
3
Medium Priority
?
317 Views
Last Modified: 2013-12-04
Ok, In windows 2000 whenever I wanted to network over to another one of my win2k machines to transfer files I would do this:  //machinename/c$
Then it would, naturally, ask me for username and password.
I would input the admin username and password for that machine and no problem!
I have recently upgraded both of my machines to XP. Now when I try the same routine, It won't let me use administrator to log on!  This has been frustrating me!  Is there a way to log log on to the hidden shares of an XP machine the way I used to in 2k? Thanks!
0
Comment
Question by:mike_higgins
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
3 Comments
 
LVL 32

Expert Comment

by:LucF
ID: 9700190
You should disable simple file sharing and you will be able to connect the same way as you were used to with win2k.
0
 
LVL 32

Accepted Solution

by:
LucF earned 500 total points
ID: 9700202
http://www.udel.edu/timmins/FileSharingXP/

Switching between Simple and Classic File Sharing

The following applies only to Windows XP Professional Edition and above.  XP Home edition can ONLY use Simple File Sharing.  Also - if the computer is a member of a domain, it will use Classic file sharing regardless of the settings shown below.

To switch to Classic File Sharing, turn Simple File Sharing off.  In Windows Explorer or My Computer pull down the tools menu, select Folder Options.  Next select the View tab, then scroll down to "Use simple file sharing (Recommended)"

LucF
0
 
LVL 32

Expert Comment

by:LucF
ID: 9703409
Glad to help
0

Featured Post

Need protection from advanced malware attacks?

Look no further than WatchGuard's Total Security Suite, providing defense in depth against today's most headlining attacks like Petya 2.0 and WannaCry. Keep your organization out of the news with protection from known and unknown threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As I write this article, I am finishing cleanup from the Qakbot virus variant found in the wild on April 18, 2011.  It was a messy beast that had varying levels of infection, speculated as being dependent on how long it resided on the infected syste…
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
Suggested Courses
Course of the Month13 days, 18 hours left to enroll

801 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question