Solved

mapping

Posted on 2004-09-18
1
304 Views
Last Modified: 2010-03-18
I have three PCs on a workgroup, If i create a share on say one PC I want everybody to be able to map to thia share without putting the username and password in everytime they need to use the share. At the moment they map drive x://merlin/dfsroot and then connect as smarsden and password and it connects ok. How can they just map without the password? It means me putting my password in everytime they need to connect after a reboot
0
Comment
Question by:chorley200
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 104

Accepted Solution

by:
Sembee earned 250 total points
ID: 12091539
Windows will attempt to use the same username and password that was used to login when connecting to other resources. It appears that the username and password doesn't exist on the machine that you have shared the folder on.

You have three choices.

1. Get a server and create a domain.
2. Create username and passwords on each machine that match
3. Enable the guest account - but this creates a massive security risk.

In future - it would help if you indicated what operating system each machine is running. I have made a presumption there that you are running with Windows 2000 or XP on all machines.

Simon.
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
Enterprise networks where VoIP phones have been deployed frequently use port configurations that allow both a computer and an IP phone to be plugged into the same switch port but use different VLANs. On Cisco equipment I'm referring to the "native V…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question