Solved

Lan Gaming

Posted on 2006-10-26
5
225 Views
Last Modified: 2010-03-19
When cpu A hosts a game, cpu B can not find it. But when cpu B hosts a game cpu can see it ? Why is that ?
0
Comment
Question by:B4N
5 Comments
 
LVL 77

Expert Comment

by:Rob Williams
ID: 17816365
The most common problem would be the Windows, or another software firewall blocking it on computer A, such as Symantec, Zone Alarm, McAfee or other. To disable the Windows firewall open Windows Firewall in the control panel and set to off.
0
 

Author Comment

by:B4N
ID: 17816407
OK I w8ll try that
0
 

Author Comment

by:B4N
ID: 17816433
It was already unlocked , so I turned it off and it stiil did not work. CPU C can see both A and B ?
0
 
LVL 2

Accepted Solution

by:
dually681 earned 250 total points
ID: 17816629
most likely you either have a subnet mask problem from what i see, give me some more details on your network settings, but chgeck to make sure both are the same subnet mask 255.255.255.0 is the most common home and sml med office setups.

Enjoy,
Dually
0
 
LVL 18

Expert Comment

by:Rartemass
ID: 17817208
What OS is on the computers?
For Windows 2000 you need a local account with the same name as one that is logged in on the other PC.
Eg PC A is running Win XP and has user ID: Fred
PC B is running Win 2K and has user ID: Barney
PC B will need a local account called Fred for access to function correctly.
0

Featured Post

Create the perfect environment for any meeting

You might have a modern environment with all sorts of high-tech equipment, but what makes it worthwhile is how you seamlessly bring together the presentation with audio, video and lighting. The ATEN Control System provides integrated control and system automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
DNS Server 7 60
Need to know how to add another Cisco switch to my existing stack and join it to the correct VLAN 25 44
how to determine subnet mask? 11 40
Reverse DND setup 6 38
Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question