Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Peer-to-Peer Network file protection

Posted on 2004-10-05
5
Medium Priority
?
227 Views
Last Modified: 2010-08-05
I volunteer at a non-profit association that shares files on a peer to peer network (XP and 98 PCs) with a broadband Internet connection. We want to eliminate access to these files by volunteers that use a specific computer. We cannot password protect each file, so is there a way to simply keep that computer off the network and still be able to access the internet?
0
Comment
Question by:jhardwick
  • 2
4 Comments
 
LVL 11

Expert Comment

by:Eric
ID: 12230664
in xp you can make a custom route config.
from cmd line
route print
route /?
try pointing the local IP to the gateway address instead of the local NIC's IP.
dont remember if 98 has routing options like that.

does everyoen log on as different users?  you could make everyone have one userid that has access to files, and everyone else a different one.
they will not have access that way by default.
0
 
LVL 11

Expert Comment

by:gothicbloody
ID: 12233089
0
 
LVL 18

Accepted Solution

by:
crissand earned 200 total points
ID: 12237401
If there are windows 98 workstation the option used in Windows xp is called simple file sharing. In windows 98 you can password protect the share.
0
 
LVL 11

Expert Comment

by:gothicbloody
ID: 12241039
0

Featured Post

Receive 1:1 tech help

Solve your biggest tech problems alongside global tech experts with 1:1 help.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
This is the first one of a series of articles I’ll be writing to address technical issues that are always referred to as network problems. The network boundaries have changed, therefore having an understanding of how each piece in the network  puzzl…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an anti-spam), the admin…

578 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question