Solved

mapping

Posted on 2004-09-18
1
300 Views
Last Modified: 2010-03-18
I have three PCs on a workgroup, If i create a share on say one PC I want everybody to be able to map to thia share without putting the username and password in everytime they need to use the share. At the moment they map drive x://merlin/dfsroot and then connect as smarsden and password and it connects ok. How can they just map without the password? It means me putting my password in everytime they need to connect after a reboot
0
Comment
Question by:chorley200
1 Comment
 
LVL 104

Accepted Solution

by:
Sembee earned 250 total points
ID: 12091539
Windows will attempt to use the same username and password that was used to login when connecting to other resources. It appears that the username and password doesn't exist on the machine that you have shared the folder on.

You have three choices.

1. Get a server and create a domain.
2. Create username and passwords on each machine that match
3. Enable the guest account - but this creates a massive security risk.

In future - it would help if you indicated what operating system each machine is running. I have made a presumption there that you are running with Windows 2000 or XP on all machines.

Simon.
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Sometimes you might need to configure routing based not only on destination IP address, but also on a combination of destination IP address (or hostname) and destination port number. I will describe a method how to accomplish this with free tools. …
The Need In an Active Directory enviroment, the PDC emulator provide time synchronization for the domain. This is important since Active Directory uses Kerberos for authentication.  By default, if the time difference between systems is off by more …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question