Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Other people's shared documents keep appearing in my Network Places

Posted on 2004-09-16
5
Medium Priority
?
232 Views
Last Modified: 2012-06-21


I use my school's wireless connection to connect to the internet using my laptop (centrino processor). The connection is a VPN. However, I notice that when I am connected to the network that other people's shared documents folders keep appearing on my PC. Is this a security threat for me? Why is this? How do I make this go away? I have confidential data on my PC so this is important to me.

Thanks
Jeff
0
Comment
Question by:jrohlman
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
5 Comments
 
LVL 12

Expert Comment

by:valicon
ID: 12075956
When you say that other peoples shared documents are appearing on your pc, where are they appearing?  Are you certain that you are not looking at shares on different computers?  Please provide more information specifically what steps you take to actually see these shares and their locations.
0
 
LVL 12

Expert Comment

by:valicon
ID: 12077313
What you probably are seeing is shared resources that are on other peoples computers.  However to clarify this please answer the above post :)
0
 
LVL 12

Expert Comment

by:valicon
ID: 12077326
Or, if you cannot see these shared resources while you are NOT logged into your school's network, then that means what you are seeing is shared resources that are on the school's network and not on your computer.
0
 

Author Comment

by:jrohlman
ID: 12105180
they are shared doc folders in "My Network Places". If I try to open theses folders while I'm on the network than I have to provide a password that I obvioulsy don't know.If I'm not on the network then it just tells me I have selected an invalid path.

I also can see them when I'm not on the school's network. The folders name are like "SharedDoc's... on Brians PC or Nisha's LT or annasdesk". I just want to make sure that they are not acquiring any of my docs or able to get to My Documents. Hope this helps...

Jeff
0
 
LVL 12

Accepted Solution

by:
valicon earned 2000 total points
ID: 12107684
Hi Jeff.

What you are seeing is other peoples shared resources (folders, files) in Network Neighborhood.  You only see them while you are connected to the network, so these files and folders are not on your computer.  When you try to access them while you are off the network you receive an Invalid Path error, which is conformation that these resources are not on your computer.  This is not a security threat to you in any way.  Hope this helps :)
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Nslookup is a command line driven utility supplied as part of most Windows operating systems that can reveal information related to domain names and the Internet Protocol (IP) addresses associated with them. In simple terms, it is a tool that can …
The Need In an Active Directory enviroment, the PDC emulator provide time synchronization for the domain. This is important since Active Directory uses Kerberos for authentication.  By default, if the time difference between systems is off by more …
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question