Earthweb.com Practically Networked Home Earthweb developer.com HardwareCentral earthwebdeveloper CrossNodes Datamation
Welcome to PractiallyNetworked
 
Get The Newsletter!  
  
Product Reviews

 • Routers
 • Hubs/Switches
 • Wireless Gateway
 • Wireless AP
 • Wireless NIC
 • Network Storage
 • Print Servers
 • Bluetooth Adapters
Troubleshooting
& Tutorials

 • Networking
 • Internet Sharing
 • Security
 • Backgrounders
 • Troubleshooting
    Guides

 • PracNet How To's
User Opinions
Practicallynetworked Glossary

 Find a Network Term  
 
Daily News
Compare Prices

 • Routers
 • Hubs/Switches
 • Servers
 • Storage
 • Adapters
 • Wireless
Forums
About
Jobs
Home

internet.commerce
Be a Commerce Partner














Find a Hotspot...

Add this search code to your site!
Copyright 2003Jupitermedia
  Most Popular Tutorials

• Microsoft Vista Home Networking Setup and Options
The most daunting part of upgrading to Windows Vista may be trying to figure out where in the layers of menus the networking and file-sharing options are hidden.

• Do It Yourself: Roll Your Own Network Cables
It may not be something you do everyday, but having the supplies and know-how to whip up a network cable on the spot can be very handy.

• Tips for Securing Your Home Router
Seemingly minor and easily overlooked settings can still have profound security implications. Here are some steps you can take to make sure your wired or wireless home router — and by extension, your network — is as secure as possible.

  Most Popular Reviews

• Microsoft Windows Home Server
If you have a home network, you'll welcome the easy file sharing, remote access and the image-based backup features of Windows Home Server.

• Iomega StorCenter Network Hard Drive
Iomega's fourth generation StorCenter Network Hard Drive brings many of the features found in higher-end storage devices down to an attractive price.

• MikroTik's The Dude
This free tool delivers many of the same capabilities that you'd find in pricey network monitoring tools. As long as you don't mind tinkering, The Dude is a decent network utility that should be worth the download.


Windows XP lets you share a computer's disks and folders with other computers on the network, using a method called Simple File Sharing. And it really is simple. If a disk or folder is shared, everyone on the network can access it. There are no user permissions and no passwords. Because sharing in this way is so wide open, Windows XP tries to protect you from some potential security risks.

Note: Windows XP Professional has a much more powerful way to
control file sharing. For full details, see our article on Windows XP Professional File Sharing.

Right click the disk or folder that you want to share and select Sharing and Security.

The disk or folder that you share, along with all of the folders that it contains, will be accessible by other network users. If you're sharing an entire disk, Windows XP gives a warning. The implication of the warning is that it's better to share a specific folder, since only that folder (and its subfolders) will be accessible by others, and the rest of the disk will be inaccessible. Click where indicated if you want to go ahead and share the entire disk. This screen doesn't appear if you're sharing a folder.

The first time that you set up sharing, Windows XP displays a warning, urging you to use the Network Setup Wizard for safety. Click where indicated to either run the Wizard or to do it yourself.

What great secret does the Wizard know that XP thinks you don't? The Wizard automatically enables the Internet Connection Firewall (ICF) to prevent other Internet users from accessing your shared disks and folders. If you have Service Pack 2 installed, the built-in Windows Firewall should already be running automatically, unless you turned it off.

XP displays another warning. If you want the firewall enabled, select Use the wizard to enable file sharing. Otherwise, select Just enable file sharing.

Having successfully run the Wizard's obstacle course, you may now specify a Share name, which users on other networked computers will use to access this disk or folder. For maximum compatibility with all versions of Windows, use 1-12 characters.

By default, users on other computers have full access: they can read, write, and delete shared files. If you only want them to be able to read files, un-check Allow network users to change my files.

Warning: If a user has full access, deleting a file doesn't put it in the Recycle Bin. Once it's deleted, it's gone for good.

Hiding a Shared Disk or Folder

What if you don't want everyone on the network to be able to access a shared disk or folder? For example:

  • Mom, Dad, and Junior each have a computer.

  • The computers are networked so that everyone can share a cable modem Internet connection.

  • Mom and Dad share a folder that stores the family's financial data.

  • They don't want Junior to see the folder or the data.

The answer is to create a hidden share by adding a dollar sign ('$') to the end of the share name. A hidden share doesn't appear in My Network Places or Network Neighborhood on any of the networked computers. In order to access a hidden share you need to already know the name of it.

Warning: Using hidden shares is a good way to keep their contents out of the hands of casual users, but a determined individual using certain techniques and/or utilities will be able to detect them. Therefore, you should not rely on hidden shares to provide security for any truly sensitive data.

To create a hidden share, right click the disk or folder and select Sharing and Security.

Specify a share name that ends with a dollar sign. Once again, use 1-12 characters (1-11 before the dollar sign). If Junior is clever enough to guess a name like Finances$, use a more secure name, like a combination of letters and numbers. Just make sure that Mom and Dad can remember it, and don't write it on a yellow sticky note attached to the monitor!

]

Accessing a Hidden Share

A hidden share doesn't appear on any of the networked computers, so how can someone on another computer access it? The answer is to map it as a network drive, which assigns a drive letter to the hidden share. Once it has a drive letter, you access it just like a disk on the same computer.

To map a network drive, open My Computer, click Tools, and select Map Network Drive.

Specify an unused drive letter and enter the network path for the hidden share, being sure to include the dollar sign. If you check Reconnect at logon, the mapping will happen automatically every time you start your computer. Otherwise, you'll have to map it manually every time.

Click Finish. The mapped drive is connected and appears in a new window. It's also available in My Computer.

NEXT Page

Adding Windows XP Home Edition to an Exisiting Network
Simple File Sharing
Internet Connection Firewall
WinXP Networking Protocols








The Earthweb Network


Earthwebnews.com Earthweb developer.com HardwareCentral earthwebdeveloper CrossNodes Datamation


JupiterOnlineMedia

internet.comearthweb.comDevx.commediabistro.comGraphics.com

Search:

Jupitermedia Corporation has two divisions: Jupiterimages and JupiterOnlineMedia

Jupitermedia Corporate Info


Legal Notices, Licensing, Reprints, & Permissions, Privacy Policy.

Advertise | Newsletters | Tech Jobs | Shopping | E-mail Offers

Solutions
Whitepapers and eBooks
Intel Go Parallel Portal: Interview with C++ Guru Herb Sutter
IBM Article: How Cool Is Your Data Center?
Microsoft Article: Managing Virtual Machines with Microsoft System Center
Avaya Article: How to Begin Developing with Avaya's Event Processing Language
Avaya Article: Deep Dive--Event Processor Offers Familiar Tools for Creating Event-Driven SOA Apps
Intel Whitepaper: A Methodology for Threading Serial Applications (PDF)
HP eBook: Storage Networking , Part 1
Quest Whitepaper: Improving Oracle Database Performance Using Real-Time Visual Diagnostics
ServerWatch.com Article: Tip of the Trade--IP Address Management
Avaya Article: Event Processing Demands Real-Time Response for Communications-Enabled Business Applications
ITChannelPlanet.com Article: Enterprise Fixed-Mobile Convergence Can Be Lucrative
Intel Article: Transitioning Software to Future Generations of Multi-Core
Hoovers Article: Boost Employee Morale without Breaking the Bank
Microsoft Article: Solving Data Center Complexity with Microsoft System Center Configuration Manager 2007
Internet.com eBook: All About Botnets
Intel Article: 8 Simple Rules for Designing Threaded Applications
Intel Whitepaper: Best Practices for Developing and Optimizing Threaded Applications
Avaya Article: Opening Telephony to Microsoft Developers
Intel Article: The Challenges of Developing Multithreaded Processing Pipelines
MORE WHITEPAPERS, EBOOKS, AND ARTICLES
Webcasts
Intel Video: Foundations of Parallel Programming, Part One
HP Video: Page Cost Calculator
HP Webcast: Storage Is Changing Fast - Be Ready or Be Left Behind
Epicor Webcast: Requirements to Consider When Looking at ITSM Tools
Intel Video: Three Must-Knows for Parallelism
Microsoft Partner Program Video: The Secrets to Partner Success
Microsoft Silverlight Video: Creating Fading Controls with Expression Design and Expression Blend 2
MORE WEBCASTS, PODCASTS, AND VIDEOS
Downloads and eKits
Sybase Download: SQL Anywhere Developer Edition
Red Gate Download: SQL Backup Pro and free DBA Best Practices eBook
Red Gate Download: SQL Compare Pro 6
Iron Speed Designer Application Generator
MORE DOWNLOADS, EKITS, AND FREE TRIALS
Tutorials and Demos
Flash Demo: IBM Information Server Blade
HP Demo: StorageWorks EVA4400
IBM Overview Video: Next Generation Data Warehousing
Microsoft How-to Article: Get Going with Silverlight and Windows Live
MORE TUTORIALS, DEMOS AND STEP-BY-STEP GUIDES


Home | Networking | Backgrounders | Internet Sharing | Security | HowTo | Troubleshooting | Reviews | News | About | Jobs | Tools | Forums