Solved

add network machine to access my computer

Posted on 2006-11-09
2
159 Views
Last Modified: 2013-12-04
When I right click the document that I would like to share and click
Properties, go to the Security tab, click Add, and then
Locations, only my machine shows up. I want to add my other computer to acces my computer? How can I do this.
0
Comment
Question by:dotnet22
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 10

Accepted Solution

by:
AndresM earned 400 total points
ID: 17907840
The other computer will not appear there. If both computers are part of a domain, you will see the domain and there you can choose an user.

If they are not part of a domain, the easiest way to share documents is creating same user same password in both computers.

Hope this helps.
0
 
LVL 66

Assisted Solution

by:johnb6767
johnb6767 earned 100 total points
ID: 17908522
I think there is a key point left out there. Once you have the same user and passwords on both machines, simply go back to the sharing portion, and add the other, recently added user to the share permissions. That way, NT share level Authentication passed on from the other PC, will recognize thier User ID and Password, and grant access to the share.
0

Featured Post

Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question