Solved

how to share drive in xp without showing the hand below it??

Posted on 2004-09-14
3
426 Views
Last Modified: 2010-04-11
Any way to share drive d: or any drive without displaying that hand under the drive or folder.
any help will be Appreciated...
thankx
0
Comment
Question by:Sayedmohd
3 Comments
 
LVL 67

Accepted Solution

by:
sirbounty earned 25 total points
ID: 12053101
A. When you share a folder or drive, the icon that appears in Windows Explorer changes from a typical-looking folder or drive to a folder or drive being cradled by a hand. To change this shared icon back to the default disk or drive icon, perform the following steps:

Start the registry editor (e.g., regedit.exe).
Navigate to HKEY_CLASSES_ROOT\Network\SharingHandler.
Double-click the Default value.
Highlight ntshrui.dll, press Delete, and click OK.
Close the registry editor.
Reboot the machine.

ref: http://www.winnetmag.com/Article/ArticleID/23260/23260.html
0
 
LVL 27

Expert Comment

by:pseudocyber
ID: 12053181
Or an admin can map to the hidden share of any drive using the \\devicename\d$ and the user would never know their drive is "shared".
0
 
LVL 1

Expert Comment

by:SithLoaded
ID: 12061739
If you add the $ to the end of any windows share that makes it hidden.
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
access vs trunk with voice vlan 2 44
Application timeout question 2 37
How to Create Separate Guest WiFi VLAN on Netgear R8000 19 57
ISP Change 14 51
PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question