Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

browsing throug network

Posted on 2006-12-02
3
178 Views
Last Modified: 2010-04-18
hi experts

when I browse through netwrok using unc usually the remote shared resource will check for the user and password
if I entered a valide user name and password it will be accepted and when I connect again it will use the same user and pass but is it possible to force the usage of a different user and pass like the run as used for applications
0
Comment
Question by:obmtech
3 Comments
 
LVL 57

Accepted Solution

by:
Pete Long earned 125 total points
ID: 18059312
Where does Windows XP store usernames and passwords for mapped drives and network folders?

How To Manage Stored User Names and Passwords on a Computer That Is Not in a Domain in Windows XP
http://support.microsoft.com/kb/306541/
How to manage stored user names and passwords on a computer in a domain in Windows XP
http://support.microsoft.com/kb/306992/EN-US/
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

I guess it is not common knowledge to most Wintel engineers/administrators: If you have an SNMP-based monitoring system in your environment (and it's common to have SNMP or Syslog) it's reasonably easy to enable monitoring of the Windows Event logs,…
Setting up a Microsoft WSUS update system is free relatively speaking if you have hard disk space and processor capacity.   However, WSUS can be a blessing and a curse. For example, there is nothing worse than approving updates and they just have…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…

792 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question