Solved

Mapping a network drive from XP to Linux

Posted on 2008-10-06
3
565 Views
Last Modified: 2013-12-15
Hi there,
I have come into a setup with a server running Linux and serving about 6 Windows XP clients.
We do not know the root username or password.....how could I find this please?
I came to fix a virus issue on a pc and have completely resetup this machine.
It won't map a network drive using the command: net use n: \\server\data
Is there some software I am missing from the client pc to view the server over the network?
Any thing else I am missing?
Many thanks Sam.
0
Comment
Question by:sdjohnson99
  • 2
3 Comments
 
LVL 19

Expert Comment

by:jools
Comment Utility
> I have come into a setup with a server running Linux and serving about 6 Windows XP clients.
We do not know the root username or password.....how could I find this please?

You need access to the console and boot into single user mode, to do this depends on your setup, most use grub with a graphical screen, in which case when the boot screen appears, type `a` to append then press space and type `1` and then enter, this will boot single user, you can then use the passwd utility to change the root password;
   # passwd root

If you get a boot: prompt, type `linux 1` to boot single user and do the password thing above.

For your network drive issue you will need to login with the correct credentials or join yourself onto the samba domain if you have one configured. Check out one of the other PC's to see if you're part of a domain.
0
 

Author Comment

by:sdjohnson99
Comment Utility
Thanks Jools,

The XP is XP Home, can that join a Samba domain? Where do I find this out on a pc? I cant see the server over the network from the newly setup pc.

Thanks Sam.
0
 
LVL 19

Accepted Solution

by:
jools earned 125 total points
Comment Utility
XP Home cannot be part of a domain so it's probably just normal mapping.

Sort out the root login thing so you can check the logs in /var/log on the linux server.
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Suggested Solutions

It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now