Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. General Programming
  3. C / C++ / MFC
  4. access c: drive

access c: drive

Scheduled Pinned Locked Moved C / C++ / MFC
c++sysadminhelptutorial
12 Posts 5 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • T ThatsAlok

    p_ wrote:

    please tell me how to access c: drive of other system in network from my system

    \\SYSTEM_NAME\\c$ is of any help!

    "Opinions are neither right nor wrong. I cannot change your opinion. I can, however, change what influences your opinion." - David Crow
    Never mind - my own stupidity is the source of every "problem" - Mixture

    cheers, Alok Gupta VC Forum Q&A :- I/IV Support CRY- Child Relief and You

    J Offline
    J Offline
    jhwurmbach
    wrote on last edited by
    #3

    ThatsAlok wrote:

    \\SYSTEM_NAME\\c$

    If that works, someone needs to be hit on the head. With a club. Hard and fast. Multiple times. And again. And again. If you or he starts to like it, keep on. He deserves it. This old security-hole should have been closed for years now... -- modified at 11:03 Thursday 25th October, 2007


    Let's think the unthinkable, let's do the undoable, let's prepare to grapple with the ineffable itself, and see if we may not eff it after all.
    Douglas Adams, "Dirk Gently's Holistic Detective Agency"

    W T 2 Replies Last reply
    0
    • J jhwurmbach

      ThatsAlok wrote:

      \\SYSTEM_NAME\\c$

      If that works, someone needs to be hit on the head. With a club. Hard and fast. Multiple times. And again. And again. If you or he starts to like it, keep on. He deserves it. This old security-hole should have been closed for years now... -- modified at 11:03 Thursday 25th October, 2007


      Let's think the unthinkable, let's do the undoable, let's prepare to grapple with the ineffable itself, and see if we may not eff it after all.
      Douglas Adams, "Dirk Gently's Holistic Detective Agency"

      W Offline
      W Offline
      Waldermort
      wrote on last edited by
      #4

      What on earth are you waffling on about? The only security hole is access rights on the remote machine, which by default are extremely limited.

      Waldermort

      J 1 Reply Last reply
      0
      • J jhwurmbach

        ThatsAlok wrote:

        \\SYSTEM_NAME\\c$

        If that works, someone needs to be hit on the head. With a club. Hard and fast. Multiple times. And again. And again. If you or he starts to like it, keep on. He deserves it. This old security-hole should have been closed for years now... -- modified at 11:03 Thursday 25th October, 2007


        Let's think the unthinkable, let's do the undoable, let's prepare to grapple with the ineffable itself, and see if we may not eff it after all.
        Douglas Adams, "Dirk Gently's Holistic Detective Agency"

        T Offline
        T Offline
        ThatsAlok
        wrote on last edited by
        #5

        jhwurmbach wrote:

        If that works, someone needs to be hit on the head. With a club. Hard and fast. Multiple times. And again. And again. If you or he starts to like it, keep on. He deserves it.

        have you ever work on network!? \\SYSTEM_NAME\\c$ is still available except now you have to provide username and password.

        J 1 Reply Last reply
        0
        • W Waldermort

          What on earth are you waffling on about? The only security hole is access rights on the remote machine, which by default are extremely limited.

          Waldermort

          J Offline
          J Offline
          jhwurmbach
          wrote on last edited by
          #6

          If you think that accessing your CEOs (or any coworker for that matter) C: (D:, E:, F:...-Drive is not a security-hole, I think no one can help you.


          Let's think the unthinkable, let's do the undoable, let's prepare to grapple with the ineffable itself, and see if we may not eff it after all.
          Douglas Adams, "Dirk Gently's Holistic Detective Agency"

          1 Reply Last reply
          0
          • T ThatsAlok

            jhwurmbach wrote:

            If that works, someone needs to be hit on the head. With a club. Hard and fast. Multiple times. And again. And again. If you or he starts to like it, keep on. He deserves it.

            have you ever work on network!? \\SYSTEM_NAME\\c$ is still available except now you have to provide username and password.

            J Offline
            J Offline
            jhwurmbach
            wrote on last edited by
            #7

            Oh - thats new, then. The hole is closed here for years, now. In XP you still could access anything not hidden well enough. E.G. Your bosses USB-Stick (FAT-Formated as it is).


            Let's think the unthinkable, let's do the undoable, let's prepare to grapple with the ineffable itself, and see if we may not eff it after all.
            Douglas Adams, "Dirk Gently's Holistic Detective Agency"

            T 1 Reply Last reply
            0
            • J jhwurmbach

              Oh - thats new, then. The hole is closed here for years, now. In XP you still could access anything not hidden well enough. E.G. Your bosses USB-Stick (FAT-Formated as it is).


              Let's think the unthinkable, let's do the undoable, let's prepare to grapple with the ineffable itself, and see if we may not eff it after all.
              Douglas Adams, "Dirk Gently's Holistic Detective Agency"

              T Offline
              T Offline
              ThatsAlok
              wrote on last edited by
              #8

              jhwurmbach wrote:

              Oh - thats new, then. The hole is closed here for years, now.

              i don't understand ... what you want to say!

              "Opinions are neither right nor wrong. I cannot change your opinion. I can, however, change what influences your opinion." - David Crow
              Never mind - my own stupidity is the source of every "problem" - Mixture

              cheers, Alok Gupta VC Forum Q&A :- I/IV Support CRY- Child Relief and You

              J 1 Reply Last reply
              0
              • T ThatsAlok

                jhwurmbach wrote:

                Oh - thats new, then. The hole is closed here for years, now.

                i don't understand ... what you want to say!

                "Opinions are neither right nor wrong. I cannot change your opinion. I can, however, change what influences your opinion." - David Crow
                Never mind - my own stupidity is the source of every "problem" - Mixture

                cheers, Alok Gupta VC Forum Q&A :- I/IV Support CRY- Child Relief and You

                J Offline
                J Offline
                jhwurmbach
                wrote on last edited by
                #9

                OK, again slowly: Until recently, even in XP (I think), you could scan all mounted drives on all computers in the local windows-network (that is anything up until the next network router). Anything between you and full access was the Windows file security. Non-existant e.g. on USB-Sticks. That IS a security hole. Regardless what Microsoft-cultists say. This could have been switched off in the registry. See here[^]. Our network policy enforces this. Now you tell me, that this no longer the case. Fine. It should have been never. And the ones responsible for that need to be disgraced until their fourth decendant.


                Let's think the unthinkable, let's do the undoable, let's prepare to grapple with the ineffable itself, and see if we may not eff it after all.
                Douglas Adams, "Dirk Gently's Holistic Detective Agency"

                R 1 Reply Last reply
                0
                • J jhwurmbach

                  OK, again slowly: Until recently, even in XP (I think), you could scan all mounted drives on all computers in the local windows-network (that is anything up until the next network router). Anything between you and full access was the Windows file security. Non-existant e.g. on USB-Sticks. That IS a security hole. Regardless what Microsoft-cultists say. This could have been switched off in the registry. See here[^]. Our network policy enforces this. Now you tell me, that this no longer the case. Fine. It should have been never. And the ones responsible for that need to be disgraced until their fourth decendant.


                  Let's think the unthinkable, let's do the undoable, let's prepare to grapple with the ineffable itself, and see if we may not eff it after all.
                  Douglas Adams, "Dirk Gently's Holistic Detective Agency"

                  R Offline
                  R Offline
                  Roger Broomfield
                  wrote on last edited by
                  #10

                  As an owner of a small local area network with only 3 PC's in it all on my desktop I am glad this feature exists it makes it so much easier.

                  J 1 Reply Last reply
                  0
                  • R Roger Broomfield

                    As an owner of a small local area network with only 3 PC's in it all on my desktop I am glad this feature exists it makes it so much easier.

                    J Offline
                    J Offline
                    jhwurmbach
                    wrote on last edited by
                    #11

                    Easier than just creating a real share where you need it?


                    Let's think the unthinkable, let's do the undoable, let's prepare to grapple with the ineffable itself, and see if we may not eff it after all.
                    Douglas Adams, "Dirk Gently's Holistic Detective Agency"

                    R 1 Reply Last reply
                    0
                    • J jhwurmbach

                      Easier than just creating a real share where you need it?


                      Let's think the unthinkable, let's do the undoable, let's prepare to grapple with the ineffable itself, and see if we may not eff it after all.
                      Douglas Adams, "Dirk Gently's Holistic Detective Agency"

                      R Offline
                      R Offline
                      Roger Broomfield
                      wrote on last edited by
                      #12

                      well actually no, because I know how to use Net Share from the commandline, but yes if all I had was the poxy windows folder share prpoerty sheet it is much easier because the property sheet sharing page wants to reset all permissions on every thing below the share point which is totally unneccessary in a desktop lan environment.

                      1 Reply Last reply
                      0
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Don't have an account? Register

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups