Solved

Networked 2 XP PCs; only 1 sees the other's files

Posted on 2006-07-20
6
211 Views
Last Modified: 2010-03-18
I recently used the exchange to help me configure my 2 XP PCs to file share.  I followed the instructions identically on both PCs as far as I know.  Anyway, I know the network is somewhat functioning--one of the PCs can see and access the files that were designated as "shared" on the other, but it's not a two-way share for some reason.

Any ideas on what I need to do to get them to share back and forth?  

Thank you in advance for your assistance.
0
Comment
Question by:chrisyano
  • 3
  • 3
6 Comments
 
LVL 48

Accepted Solution

by:
Jay_Jay70 earned 500 total points
ID: 17150265
are these both xp pro machines?

disable the windows firewall service and make sure you can ping each machine from the other

try \\machinename and let me know what you find
0
 

Author Comment

by:chrisyano
ID: 17150455
Yes they are both XP Pro machines.

I did disable the windows firewall on both, but I will double check that and try pinging them.

I don't quite understand what the \\machinename is though...

Thanks for the quick response.
0
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 17150669
\\machinename is a quick way to tell if you can access the machine....you can also do it via \\ipaddress

start - run - \\
0
Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

 

Author Comment

by:chrisyano
ID: 17151424
I didn't seem to have to change anything, but it works now.  Thank you for your help.  I gave the other guy 400 on the other post since you're getting the full 500 here.  Hope that's ok.
0
 

Author Comment

by:chrisyano
ID: 17151426
Keep an eye out for some more easy 500 pointers coming soon I'm sure.
0
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 17151452
as long as things are working with you all is good!
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

The Need In an Active Directory enviroment, the PDC emulator provide time synchronization for the domain. This is important since Active Directory uses Kerberos for authentication.  By default, if the time difference between systems is off by more …
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now