Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Peer-to-Peer Network file protection

Posted on 2004-10-05
5
Medium Priority
?
226 Views
Last Modified: 2010-08-05
I volunteer at a non-profit association that shares files on a peer to peer network (XP and 98 PCs) with a broadband Internet connection. We want to eliminate access to these files by volunteers that use a specific computer. We cannot password protect each file, so is there a way to simply keep that computer off the network and still be able to access the internet?
0
Comment
Question by:jhardwick
  • 2
5 Comments
 
LVL 11

Expert Comment

by:Eric
ID: 12230664
in xp you can make a custom route config.
from cmd line
route print
route /?
try pointing the local IP to the gateway address instead of the local NIC's IP.
dont remember if 98 has routing options like that.

does everyoen log on as different users?  you could make everyone have one userid that has access to files, and everyone else a different one.
they will not have access that way by default.
0
 
LVL 11

Expert Comment

by:gothicbloody
ID: 12233089
0
 
LVL 18

Accepted Solution

by:
crissand earned 200 total points
ID: 12237401
If there are windows 98 workstation the option used in Windows xp is called simple file sharing. In windows 98 you can password protect the share.
0
 
LVL 11

Expert Comment

by:gothicbloody
ID: 12241039
0

Featured Post

Veeam Task Manager for Hyper-V

Task Manager for Hyper-V provides critical information that allows you to monitor Hyper-V performance by displaying real-time views of CPU and memory at the individual VM-level, so you can quickly identify which VMs are using host resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Greetings, Experts! First let me state that this website is top notch. I thoroughly enjoy the community that is shared here; those seeking help and those willing to sacrifice their time to help. It is fantastic. I am writing this article at th…
The Need In an Active Directory enviroment, the PDC emulator provide time synchronization for the domain. This is important since Active Directory uses Kerberos for authentication.  By default, if the time difference between systems is off by more …
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
This lesson discusses how to use a Mainform + Subforms in Microsoft Access to find and enter data for payments on orders. The sample data comes from a custom shop that builds and sells movable storage structures that are delivered to your property. …

971 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question