Solved

Windows XP Pro, File Share Problems

Posted on 2004-10-29
202 Views
Last Modified: 2010-03-18
Hey,

One computer on my network can see some of the files on a network share but can't see them all. All other computers on the network can see the missing files just fine, access them, change them, etc.....just fine. The files have no weird permmisons at all. This problem is really confusing my co-worker and myself. Thanks for help in advance.
0
Question by:Pizentios
    5 Comments
     
    LVL 5

    Expert Comment

    by:SKULLS_Hawk
    What kind of permissions are set on the files?  Is this a server based share, or peer to peer type?
    0
     

    Author Comment

    by:Pizentios
    Thanks for the quick reply.

    The file permissions are wide open. write and read access to all.

    And yes it's a server base file share. It's on a IBM Netfinity.
    0
     
    LVL 5

    Accepted Solution

    by:
    No problem, always glad to try and help.
    What happens if you log on to the machine that can't see all the files?  And also what happens when the user with the problem logs onto another machine?

    If he logs onto another machine and has the same problem then there is definately a right problem someone.  Possibly someone has set the rights on the file to deny for him?

    Test him on another machine if possible to eliminate or confirm rights as  a problem.  If you can log onto his machine and see all the files, then the machine is fine, and it may be rights, subject to the other test.

    most of the time these kinds of problems are down to rights.  

    Remember that file access can also be specified on a file by file basis.  That's why it is best to either confirm or eliminate rights as a problem.
    0
     

    Author Comment

    by:Pizentios
    fixed it, it had somthing to do with the way that she was connecting to the network drive. Thanks for your help though.
    0
     
    LVL 5

    Expert Comment

    by:SKULLS_Hawk
    No Problem
    0

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone. Privacy Policy Terms of Use

    Featured Post

    Threat Intelligence Starter Resources

    Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

    Sometimes you might need to configure routing based not only on destination IP address, but also on a combination of destination IP address (or hostname) and destination port number. I will describe a method how to accomplish this with free tools. …
    Are you one of those front-line IT Service Desk staff fielding calls, replying to emails, all-the-while working to resolve end-user technological nightmares? I am! That's why I have put together this brief overview of tools and techniques I use in o…
    how to add IIS SMTP to handle application/Scanner relays into office 365.
    This video discusses moving either the default database or any database to a new volume.

    875 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    13 Experts available now in Live!

    Get 1:1 Help Now