Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

"net use" returns 'invalid username or password'

Posted on 2004-03-25
2
Medium Priority
?
2,591 Views
Last Modified: 2012-05-04
I have a very simple peer-to-peer network set up.  One Windows XP Professional for a file server, two Windows XP home workstations and one Windows 98 workstation.

An account was created on the XP Pro server with matching username/password for each workstation so the authentication credentials at the workstations were passed to the XP Pro server.

Two folders on the server are shared and security was set to ALL with full control.  Drives were mapped on all the workstations to the two folders and everything work fine for weeks.

Yesterday, the XP Home workstaions stopped connecting to the XP Pro server.  If you co to a command window and use net use z: \\greatserver\accounting , the message returned is 'invalid username or password'.  If I type the very same username and password that I used to log on to the local workstation, then the map works.

There is not doubt that the username and password used to log on to the XP home workstations matched the user accounts and passwords of the XP Pro computer.  This just stopped working out of the blue.  The customer had used an NTI Backup program to back up the data to a CD-RW, otherwaise, there have been no changes.  Any ideas on this one?

I tried creating a batch file as follows but it hangs asking for the correct password for \\greatserver

net use z: /d
net use z: \\greatserver\accounting

Thanks.
0
Comment
Question by:meesha
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 16

Accepted Solution

by:
JammyPak earned 2000 total points
ID: 10678522
what if you use

net use z: \\greatserver\accounting /User:<username>

does it still ask for a password?
0
 

Author Comment

by:meesha
ID: 10679347
Good man!  Thanks.
0

Featured Post

Important Lessons on Recovering from Petya

In their most recent webinar, Skyport Systems explores ways to isolate and protect critical databases to keep the core of your company safe from harm.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

We recently endured a series of broadcast storms that caused our ISP to shut us down for brief periods of time. After going through a multitude of tests, we determined that the issue was related to Intel NIC drivers on some new HP desktop computers …
Are you one of those front-line IT Service Desk staff fielding calls, replying to emails, all-the-while working to resolve end-user technological nightmares? I am! That's why I have put together this brief overview of tools and techniques I use in o…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
In this video, Percona Solution Engineer Rick Golba discuss how (and why) you implement high availability in a database environment. To discuss how Percona Consulting can help with your design and architecture needs for your database and infrastr…

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question