SoFunction
Updated on 2025-04-13

A complete collection of security protection for shared resources in LAN

A complete collection of security protection for shared resources in LAN

Updated: November 3, 2006 00:00:00 Author:

In the virtual network world, all the insidiousness and despicability in real life are clearly visible. In the information age, almost everyone is facing security threats. It is necessary to have some understanding of network security and be able to deal with some security issues. Those who do not pay attention to security often regret it when they pay heavy prices. Below, the author will introduce several security prevention techniques for protecting shared resources in LANs, hoping to help you. In Windows LAN, sometimes in order to be able to share certain resources, you can often establish a shared name for the resources that need to be shared, and then users who need to use the shared resources can access the shared resources through the online neighbor function in the LAN. Although sharing can bring us operational convenience, it is undeniable that it also poses a security threat to us. Some illegal users can use the sharing function to delete, change or destroy resources on other computers in the LAN at will. In order to protect the security of shared resources, we can set a shared password on the Window's shared-level system; at the same time, the access type of shared folders can be set to "read-only" or "complete" to ensure its security. For example, to safely share a folder with important information, you can set password protection for the folder, set access permissions, and tell only the password to a specific user. Even though we set an access password for shared resources, every user on the LAN can still see this shared resource in "Online Neighbors". In today's rampant hackers, these access passwords are useless in front of advanced hackers, so we must not think that setting passwords is safe. So what methods should we take to ensure relative safety? Users who have used NT may know that NT will create a shared name like "C$" for the C drive by default, but we cannot see the C folder in the online neighbors, which means that the "$" symbol can hide the shared folder; so here, we can also use this method. When setting a shared name for resources that need to be shared, we only need to attach a US dollar flag ($) to the share name. After setting the share name, when you open "Online Neighbor" again, you will find that the shared resource you are setting cannot be found now. At this time, no matter how powerful you are in hacking, you cannot destroy this shared resource. Using $ to set a share name adds a strong barrier to keeping the shared resource safe, and any access restrictions or passwords for that shared resource are still valid. Below, the author will use practical examples to illustrate the application situation of this technique. The author needs to set a shared folder in computer A on a certain LAN, and the shared folder required to be set cannot be seen by other users, and only the specified user B is allowed to access it. To achieve the above operation purpose, we can follow the following steps: 1. First, A finds the resource folder that needs to be shared in the computer. For example, we assume that the Famen folder resources in disk E are shared with B for use. 2. Then, right-click on the famen folder and select the "Share" command from the right-click menu that pops up later. The program will open a settings dialog box.
  • Local
  • Domain Network
  • Internet
  • shared
  • Enjoy the money
  • resource
  • Yuan'an
  • Safety
  • Full defense
  • Protection
  • Protect the Great
  • Complete collection
  • Complete

Related Articles

  • Properly configure the firewall

    Properly configure the firewall...
    2006-11-11
  • Kingsoft Anti-Virus 20050110_Daily

    Kingsoft Anti-Virus 20050110_Daily...
    2006-11-11
  • 2007 online favorites website collection

    2007 online favorites website collection...
    2007-03-03
  • A complete collection of security protection for shared resources in LAN

    A complete collection of security protection for shared resources in LAN...
    2006-11-11
  • What does bit, bytes mean?

    What does bit, bytes mean? ...
    2007-02-02
  • Settings for single network card ADSL sharing Internet access

    Settings for single network card ADSL sharing Internet access...
    2006-11-11
  • QQ prevents others from logging in. How to prohibit others from logging in.

    Several ways to prevent others from logging in to QQ on your computer. The instant messaging software QQ has more and more users, and QQ numbers have become another main contact information after mobile phone numbers. But if you don't want your colleagues, classmates, relatives and friends to use the QQ in your machine to chat and transmit bad information
    2008-03-03
  • Use ADSL to share the Internet without proxy

    Use ADSL to share the Internet without proxy...
    2006-11-11
  • Beware that your ADSL cat is blackened

    Beware that your ADSL cat is hacked...
    2006-11-11
  • Experience three major online network security detection services

    Experience three major online network security detection services...
    2006-11-11

Latest Comments