Please register or login. There are 0 registered and 1253 anonymous users currently online. Current bandwidth usage: 326.30 kbit/s December 16 - 11:46am EST 
Hardware Analysis
      
Forums Product Prices
  Contents 
 
 

  Latest Topics 
 

More >>
 

    
 
 

  You Are Here: 
 
/ Forums / Networking / Wireless /
 

  Folder Sharing with specific people? 
 
 Author 
 Date Written 
 Tools 
Hit Machine Dec 13, 2012, 01:51am EST Reply - Quote - Report Abuse
Private Message - Add to Buddy List Replies: 4 - Views: 2088
Can a folder be shared with specific people in networking in windows 7?

What are the steps to do so just after windows and drivers installation?


Want to enjoy fewer advertisements and more features? Click here to become a Hardware Analysis registered user.
John Edwin Jan 28, 2013, 03:53am EST Reply - Quote - Report Abuse
Private Message - Add to Buddy List  
>> Re: Folder Sharing with specific people?
Hi,
Is this Network in a domain or its just peer-peer?

Keith Braud Jan 29, 2013, 06:13am EST Reply - Quote - Report Abuse
Private Message - Add to Buddy List  
>> Re: Folder Sharing with specific people?
If your system is attached with a domain then you would have to configure your network domain settings. But if you are using some shared network then you would have just to make folder shared.

Hit Machine Mar 08, 2013, 03:35am EST Reply - Quote - Report Abuse
Private Message - Add to Buddy List  
>> Re: Folder Sharing with specific people?
It is on network sharing & not in domain.

john albrich Mar 08, 2013, 08:40am EST Reply - Quote - Report Abuse
Private Message - Add to Buddy List  
>> Re: Folder Sharing with specific people?
.
Perhaps you could approach it sideways...?

Use encryption to limit access, and if necessary, use volume hiding (aka "plausible deniability") techniques if you need to keep others from even knowing a given volume/folder exists.

See freeware/donateware open source TrueCrypt for more information on ways to achieve what I believe would achieve the same end results.

Access authentication is flexible. For example, it can be a typical keyboard input password, a specific file that has to exist on the user's machine, or even (if my memory serves correctly) a specific USB memory stick.

http://www.majorgeeks.com/TrueCrypt_d6032.html
http://www.truecrypt.org/


Write a Reply >>


 

    
 
 

  Topic Tools 
 
RSS UpdatesRSS Updates
 

  Related Articles 
 
 

  Newsletter 
 
A weekly newsletter featuring an editorial and a roundup of the latest articles, news and other interesting topics.

Please enter your email address below and click Subscribe.