Solved

"net use" returns 'invalid username or password'

Posted on 2004-03-25
2
2,581 Views
Last Modified: 2012-05-04
I have a very simple peer-to-peer network set up.  One Windows XP Professional for a file server, two Windows XP home workstations and one Windows 98 workstation.

An account was created on the XP Pro server with matching username/password for each workstation so the authentication credentials at the workstations were passed to the XP Pro server.

Two folders on the server are shared and security was set to ALL with full control.  Drives were mapped on all the workstations to the two folders and everything work fine for weeks.

Yesterday, the XP Home workstaions stopped connecting to the XP Pro server.  If you co to a command window and use net use z: \\greatserver\accounting , the message returned is 'invalid username or password'.  If I type the very same username and password that I used to log on to the local workstation, then the map works.

There is not doubt that the username and password used to log on to the XP home workstations matched the user accounts and passwords of the XP Pro computer.  This just stopped working out of the blue.  The customer had used an NTI Backup program to back up the data to a CD-RW, otherwaise, there have been no changes.  Any ideas on this one?

I tried creating a batch file as follows but it hangs asking for the correct password for \\greatserver

net use z: /d
net use z: \\greatserver\accounting

Thanks.
0
Comment
Question by:meesha
2 Comments
 
LVL 16

Accepted Solution

by:
JammyPak earned 500 total points
ID: 10678522
what if you use

net use z: \\greatserver\accounting /User:<username>

does it still ask for a password?
0
 

Author Comment

by:meesha
ID: 10679347
Good man!  Thanks.
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
A common practice in small networks is making file sharing easy which works extremely well when intra-network security is not an issue. In essence, everyone, that is "Everyone", is given access to all of the shared files - often the entire C: drive …
In a recent question (https://www.experts-exchange.com/questions/28997919/Pagination-in-Adobe-Acrobat.html) here at Experts Exchange, a member asked how to add page numbers to a PDF file using Adobe Acrobat XI Pro. This short video Micro Tutorial sh…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now