Solved

cannot see some win  2000 pc's within a workgroup

Posted on 2003-11-13
6
483 Views
Last Modified: 2012-05-04
I can see some win 2000 pc in a workgroupm and some i can not see. The machine name is different that the user name, file print share is on, and unsure where to find the "Browse Master" setting on a 2000 workstation.
0
Comment
Question by:nadaclue2k2
  • 3
  • 2
6 Comments
 
LVL 1

Accepted Solution

by:
DustinR1 earned 250 total points
Comment Utility
Looks like your browse list is having problems. Check out this troubleshooting article on Microsoft: http://support.microsoft.com/default.aspx?scid=kb;en-us;188305&Product=win2000

It requires you have browstat.exe from the w2k reskit. If you need it, just e-mail me.
0
 

Author Comment

by:nadaclue2k2
Comment Utility
If you would, please send the file

Thanks
0
 
LVL 1

Expert Comment

by:DustinR1
Comment Utility
what e-mail address would you like me to send it to?
0
NetScaler Deployment Guides and Resources

Citrix NetScaler is certified to support many of the most commonly deployed enterprise applications. Deployment guides provide in-depth recommendations on configuring NetScaler to meet specific application requirements.

 

Author Comment

by:nadaclue2k2
Comment Utility
alc@qdiwireless.com
0
 
LVL 1

Expert Comment

by:DustinR1
Comment Utility
Sent. Tell me if you don't get it and I will Zip it up for you.
0
 

Expert Comment

by:henryenr
Comment Utility
hmmm.  sorry, i'm not sure what's ur asking, but i think if you share something on the computer that you aren't able to see, you'll be able to see the HD .. or you could put the same domain name on every computer..
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now