Solved

I need to create a batch file that will execute over a workgroup of 20 XP Pro computers.

Posted on 2007-11-28
3
236 Views
Last Modified: 2010-04-16
 I need to have a setup.exe file run on each of 20 computers in a workgroup.  The setup.exe file is located on my computer in a shared directory that is accessible to all computers in the network.   I need the command, for the individual operators to type into the run command to run the file on their computer.  It would be nice if the command would execute when they hit enter.  I will give them a hard copy of the command line with a explanation of the need to run the command.

The file is located at    c:\downloads\deployment\setup.exe
On my computer
The IP address on my computer is       10.27.53.15
The name of my computer is      pcterm10chetr
The workgroup is             gmadom03235
0
Comment
Question by:scubaman1949
3 Comments
 
LVL 3

Expert Comment

by:Zeracles
ID: 20367050
You should share the "Downloads" directory *and run "\\10.27.53.15\downloads\deployment\setup.exe"
0
 

Author Comment

by:scubaman1949
ID: 20367184
Thanks for the reply however when I type in   "\\10.27.53.15\downloads\deployment\setup.exe"   I get the error message    The network path was not found
I can see the setup.exe if I go to network places and access it manually  from my test computer which is in the same workgroup.  
I have tried the command with adn without the "
0
 
LVL 4

Accepted Solution

by:
Joediggity2 earned 125 total points
ID: 20367311
If the downloads directory is shared properly,

\\pcterm10chetr\downloads\setup.exe


Also, in a workgroup, you need to have the same usernames and passwords defined on each workstation and the "server".  otherwise, if you have one generic username...

start>Run>
\\pcterm10chetr\downloads
It will promplt for a username and password (use the generic username that is on your server computer)
click on setup.exe

0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
.csv files 5 78
Event ID: 1008 / Source: Microsoft-Windows-Perflib 2 60
Computer software inventory 5 34
how to use wail2ban ?? 13 29
Step by step guide to Clean and Sort your windows registry! Introduction: Always remember: A Clean registry = Better performance = Save your invaluable time In this article we're going to clear our registry manually! Yes, manually! The e…
Use this article to create a batch file to backup a Microsoft SQL Server database to a Windows folder.  The folder can be on the local hard drive or on a network share.  This batch file will query the SQL server to get the current date & time and wi…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now