Share and share alike

Bannan, James
November 2005
APC (Bauer Media Group);Nov2005, Vol. 25 Issue 11, p92
This article presents suggestions on secured computer file sharing. Windows XP is an operating system designed for communication, letting users interact, share data and more. The problem is that XP makes it a little too easy. What needs to be kept in mind when assessing XP's file-sharing security is that it's dual-layered. With XP file security, rights can be assigned to individual users or groups of people. One should right-click on My Computer and select Manage to open up Computer Management, and expand Local User and Groups under System Tools. The Users and Groups subfolders provide details of what user accounts and groups have been set up on the system. When remote users are going to connect to one's machine, they need some way of authenticating, as Windows requires it. To this end, the Guest account is useful because it's the same as anonymous authentication. But it also means that one have little control over who accesses the shared resources, which is why it's disabled by default. It's much better to create user accounts for each person who wants to connect. If a large number of people want to connect, one can either create accounts for each person and organise them into groups, or create a common account which they share.


Related Articles

  • STRIPPED-DOWN LONGHORN BETA ON TAP. Rooney, Paula; Darrow, Barbara // CRN;7/18/2005, Issue 1155, p14 

    This article reports that Microsoft Corp.'s first official beta of its next-generation Windows software, due this month, will lack many of the user features planned for the final code. In Longhorn, Windows will offer key user functions that include a newly revealed peer-to-peer collaborative...

  • Kazaa Lite Resurrection.  // Network Dictionary;2007, p271 

    A dictionary entry for the term "Kazaa Lite Resurrection" is presented. The term refers to a peer-to-peer (P2P) file sharing client that supports the FastTrack P2P network. Kazaa Lite Resurrection is to continue the development forward on the obsolete Kazaa Lite K++ application. It utilizes the...

  • Fakespotting P2P files. Taylor, Nathan // Australian PC User;Apr2010, Vol. 22 Issue 4, p74 

    The article presents suggestions on how to find and avoid fake files on peer-to-peer (P2P) computer networks like BitTorrent and LimeWire. It is said that some fake files on P2P networks may contain viruses and may also lead to unsafe web sites. It is suggested to read the comments available in...

  • No royalties.  // Telecom Asia;Feb2008, Vol. 19 Issue 2, p36 

    The article reports that according to a Korean Film Council survey polling, 2,358 Koreans aged 15 to 49 found that they use file sharing Web sites to pay from zero to 100 won per movie download. The average movie pirate downloads 54.5 movies per year. The author also discusses the factors that...

  • "MAKING AVAILABLE" AS DISTRIBUTION: FILE-SHARING AND THE COPYRIGHT ACT. Horsfield-Bradbury, John // Harvard Journal of Law & Technology;Fall2008, Vol. 22 Issue 1, p273 

    The article focuses on the legality of the internet file sharing as amended in the context of the Copyright Act in the U.S. It examines the origin and coverage of the "making available" doctrine, which concerns the sharing of internet files. It argues about the nullity of the doctrine and...

  • eDonkey. Taylor, Nathan // Australian PC User;Oct2006, Vol. 18 Issue 10, p89 

    The article focuses on eDonkey2000 which was the original client for the network, with the open source eMule coming along much later. Although it invented the eDonkey/eMule network, eDonkey has moved away from the server-based style of eMule and now uses a network called Overnet by default,...

  • WinMX.  // Network Dictionary;2007, p528 

    A reference entry for "WinMX" is presented. In networking, this is a peer-to-peer file sharing program that runs on Windows operating system but is has been offline since 2005 due to a lawsuit. As an OpenNAP client, WinMX is capable of connecting to several servers simultaneously. A proprietary...

  • Winny Program.  // Network Dictionary;2007, p529 

    A reference entry for "Winny Program," also known as WinNY in the context of computer software, is presented. This is a Japanese peer-to-peer file-sharing program similar to Freenet. Winny was implemented as a Windows C++ application and takes its name from WinMX, which is also a peer-to-peer...

  • Insight into redundancy schemes in DHTs. Chen, Guihai; Qiu, Tongqing; Wu, Fan // Journal of Supercomputing;Feb2008, Vol. 43 Issue 2, p183 

    In order to provide high data availability in peer-to-peer (P2P) DHTs, proper data redundancy schemes are required. This paper compares two popular schemes: replication and erasure coding. Unlike previous comparison, we take user download behavior into account. Furthermore, we propose a hybrid...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics