Solved

Peer-to-Peer Network file protection

Posted on 2004-10-05
5
217 Views
Last Modified: 2010-08-05
I volunteer at a non-profit association that shares files on a peer to peer network (XP and 98 PCs) with a broadband Internet connection. We want to eliminate access to these files by volunteers that use a specific computer. We cannot password protect each file, so is there a way to simply keep that computer off the network and still be able to access the internet?
0
Comment
Question by:jhardwick
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
5 Comments
 
LVL 11

Expert Comment

by:Eric
ID: 12230664
in xp you can make a custom route config.
from cmd line
route print
route /?
try pointing the local IP to the gateway address instead of the local NIC's IP.
dont remember if 98 has routing options like that.

does everyoen log on as different users?  you could make everyone have one userid that has access to files, and everyone else a different one.
they will not have access that way by default.
0
 
LVL 11

Expert Comment

by:gothicbloody
ID: 12233089
0
 
LVL 18

Accepted Solution

by:
crissand earned 50 total points
ID: 12237401
If there are windows 98 workstation the option used in Windows xp is called simple file sharing. In windows 98 you can password protect the share.
0
 
LVL 11

Expert Comment

by:gothicbloody
ID: 12241039
0

Featured Post

Revamp Your Training Process

Drastically shorten your training time with WalkMe's advanced online training solution that Guides your trainees to action.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
The Need In an Active Directory enviroment, the PDC emulator provide time synchronization for the domain. This is important since Active Directory uses Kerberos for authentication.  By default, if the time difference between systems is off by more …
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Suggested Courses
Course of the Month6 days, 15 hours left to enroll

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question