Transfering files between computers
-
I have 3 PCS. PC A can access PC B but not PC C. In the same way, PC C can access PC B but not PC A. PC A <-> PC B <-> PC C So if I want to transfer files from A to C, I need to first store it in B then let B transfer the files to C or instruct C to get the files from B. What can you guys suggest is the EASIEST way to accomplish this? Thanks! :)
It is said that the most complex structures built by mankind are software systems. This is not generally appreciated because most people cannot see them. Maybe that's a good thing because if we saw them as buildings, we'd deem many of them unsafe.
-
I have 3 PCS. PC A can access PC B but not PC C. In the same way, PC C can access PC B but not PC A. PC A <-> PC B <-> PC C So if I want to transfer files from A to C, I need to first store it in B then let B transfer the files to C or instruct C to get the files from B. What can you guys suggest is the EASIEST way to accomplish this? Thanks! :)
It is said that the most complex structures built by mankind are software systems. This is not generally appreciated because most people cannot see them. Maybe that's a good thing because if we saw them as buildings, we'd deem many of them unsafe.
Buy a router
-
Buy a router
We already have a router. Its just that the network is designed that way.
It is said that the most complex structures built by mankind are software systems. This is not generally appreciated because most people cannot see them. Maybe that's a good thing because if we saw them as buildings, we'd deem many of them unsafe.
-
We already have a router. Its just that the network is designed that way.
It is said that the most complex structures built by mankind are software systems. This is not generally appreciated because most people cannot see them. Maybe that's a good thing because if we saw them as buildings, we'd deem many of them unsafe.
Can you fill us in a bit more on how the network is configured? And why some of them can't see each other? Love your sig by the way.
-
Can you fill us in a bit more on how the network is configured? And why some of them can't see each other? Love your sig by the way.
PC A is in domain A. PC C is in domain C. Domain C is a "Secure Network" wherein only authorized people can access the domain. PC A is sort-of a "Public Domain". PC B is sort-of a "gatekeeper". In order to access computers on Domain C, you must first connect to PC B. So if I'm using PC A and I want to transfer files to PC C, I must first need to copy the files to PC B, and instruct PC B to transfer the files to PC C. Any suggestions?
It is said that the most complex structures built by mankind are software systems. This is not generally appreciated because most people cannot see them. Maybe that's a good thing because if we saw them as buildings, we'd deem many of them unsafe.
-
I have 3 PCS. PC A can access PC B but not PC C. In the same way, PC C can access PC B but not PC A. PC A <-> PC B <-> PC C So if I want to transfer files from A to C, I need to first store it in B then let B transfer the files to C or instruct C to get the files from B. What can you guys suggest is the EASIEST way to accomplish this? Thanks! :)
It is said that the most complex structures built by mankind are software systems. This is not generally appreciated because most people cannot see them. Maybe that's a good thing because if we saw them as buildings, we'd deem many of them unsafe.
-
PC A is in domain A. PC C is in domain C. Domain C is a "Secure Network" wherein only authorized people can access the domain. PC A is sort-of a "Public Domain". PC B is sort-of a "gatekeeper". In order to access computers on Domain C, you must first connect to PC B. So if I'm using PC A and I want to transfer files to PC C, I must first need to copy the files to PC B, and instruct PC B to transfer the files to PC C. Any suggestions?
It is said that the most complex structures built by mankind are software systems. This is not generally appreciated because most people cannot see them. Maybe that's a good thing because if we saw them as buildings, we'd deem many of them unsafe.
I assume that PC B is having two network cards with one card connected to network A and the other card to network C. And that PC B is belonging to either or neither domain. But the fact that computers in both domains are having access to the "Bridge" computer makes the whole concept doubtful at the best... I would have a talk to the network architect how you're supposed to use the network. Until then you can take a look at Robocopy which is a standard feature on Server 2008 and available in the resource kit for the prior versions. Run
robocopy /?
for some help on the usage. An interesting feature is the/MIR
switch -
I assume that PC B is having two network cards with one card connected to network A and the other card to network C. And that PC B is belonging to either or neither domain. But the fact that computers in both domains are having access to the "Bridge" computer makes the whole concept doubtful at the best... I would have a talk to the network architect how you're supposed to use the network. Until then you can take a look at Robocopy which is a standard feature on Server 2008 and available in the resource kit for the prior versions. Run
robocopy /?
for some help on the usage. An interesting feature is the/MIR
switchYou got it exactly right. Right now I am using PSEXEC but I am thinking of developing a remote execution tool. :)
It is said that the most complex structures built by mankind are software systems. This is not generally appreciated because most people cannot see them. Maybe that's a good thing because if we saw them as buildings, we'd deem many of them unsafe.
-
You got it exactly right. Right now I am using PSEXEC but I am thinking of developing a remote execution tool. :)
It is said that the most complex structures built by mankind are software systems. This is not generally appreciated because most people cannot see them. Maybe that's a good thing because if we saw them as buildings, we'd deem many of them unsafe.
I just don't see the point with a "secure network" if you want to be able to remote execute from the outside. I would exchange this "PC B" for a firewall that is closed for everything on the outside, and allow a limited amount of services to access the outside to FETCH files.
-
I have 3 PCS. PC A can access PC B but not PC C. In the same way, PC C can access PC B but not PC A. PC A <-> PC B <-> PC C So if I want to transfer files from A to C, I need to first store it in B then let B transfer the files to C or instruct C to get the files from B. What can you guys suggest is the EASIEST way to accomplish this? Thanks! :)
It is said that the most complex structures built by mankind are software systems. This is not generally appreciated because most people cannot see them. Maybe that's a good thing because if we saw them as buildings, we'd deem many of them unsafe.
You're trying to violate the security of a network that is designed to prevent you from accessing it. There's probably a good reason for that. The "right" way to do this is to establish trust relationships between the two domains, but your admin has chosen not to do so. It may be that, though it is inconvenient for you, the best choice for your organization is to continue using the tedious method. Another choice might be to establish an account in the remote domain for yourself that includes transferring files into the domain from outside. Remote Access priveleges can be established that will allow you to log on to the other domain from the local and make transfers oer that connection.
"A Journey of a Thousand Rest Stops Begins with a Single Movement"