Solved

Mapping a Network Drive vs. Sharing via the right-click menu in Windows XP & Vista

Posted on 2007-03-17
3
184 Views
Last Modified: 2010-03-18
I have always shared stuff (directories, files, and drives) by simply enabling file & print sharing on all my network computer and then right-clicking the root drives (I have like 6 hard-drives) and choosing sharing & security.
I just found out about mapping a network drive.

What is the difference?  Pros and cons?
0
Comment
Question by:davidgareau
  • 3
3 Comments
 
LVL 67

Accepted Solution

by:
sirbounty earned 500 total points
ID: 18742060
For the most part, two different means to the same end...but technically you have to consider security as the difference

You have hidden admin shares (C$ - for example or Admin$ (C:\Windows)) that you can simply map to.
But that allows the user to connect to the root of the drive - and if they have the permissions to do so, without any further prevention, they could have access to the entire system.

You can limit what they can browse by creating your own share ("Stuff" can point to c:\really long path\hidden folder\subfolder\my data\stuff I want others to see) and they can only see that share (and below) - but they can't navigate upwards in the physical tree.
0
 
LVL 67

Expert Comment

by:sirbounty
ID: 18742078
Of course, you can map to a deep path as well...

Net use r: \\Computer1\c$\really long path\hidden folder\subfolder\my data\stuff

R:\ will hold only the data in the 'stuff' folder, but the user has the option to traverse the parent folders in this scenario...not usually a good idea if you're concerned about security... :)
0
 
LVL 67

Expert Comment

by:sirbounty
ID: 18784109
What was missing that would have warranted an "A"?
0

Featured Post

Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
As companies replace their old PBX phone systems with Unified IP Communications, many are finding out that legacy applications such as fax do not work well with VoIP. Fortunately, Cloud Faxing provides a cost-effective alternative that works over an…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now