Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. Database & SysAdmin
  3. System Admin
  4. Transfering files between computers

Transfering files between computers

Scheduled Pinned Locked Moved System Admin
question
10 Posts 4 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • I Offline
    I Offline
    Ian Uy
    wrote on last edited by
    #1

    I have 3 PCS. PC A can access PC B but not PC C. In the same way, PC C can access PC B but not PC A. PC A <-> PC B <-> PC C So if I want to transfer files from A to C, I need to first store it in B then let B transfer the files to C or instruct C to get the files from B. What can you guys suggest is the EASIEST way to accomplish this? Thanks! :)

    It is said that the most complex structures built by mankind are software systems. This is not generally appreciated because most people cannot see them. Maybe that's a good thing because if we saw them as buildings, we'd deem many of them unsafe.

    J S R 3 Replies Last reply
    0
    • I Ian Uy

      I have 3 PCS. PC A can access PC B but not PC C. In the same way, PC C can access PC B but not PC A. PC A <-> PC B <-> PC C So if I want to transfer files from A to C, I need to first store it in B then let B transfer the files to C or instruct C to get the files from B. What can you guys suggest is the EASIEST way to accomplish this? Thanks! :)

      It is said that the most complex structures built by mankind are software systems. This is not generally appreciated because most people cannot see them. Maybe that's a good thing because if we saw them as buildings, we'd deem many of them unsafe.

      J Offline
      J Offline
      Jorgen Andersson
      wrote on last edited by
      #2

      Buy a router

      I 1 Reply Last reply
      0
      • J Jorgen Andersson

        Buy a router

        I Offline
        I Offline
        Ian Uy
        wrote on last edited by
        #3

        We already have a router. Its just that the network is designed that way.

        It is said that the most complex structures built by mankind are software systems. This is not generally appreciated because most people cannot see them. Maybe that's a good thing because if we saw them as buildings, we'd deem many of them unsafe.

        J 1 Reply Last reply
        0
        • I Ian Uy

          We already have a router. Its just that the network is designed that way.

          It is said that the most complex structures built by mankind are software systems. This is not generally appreciated because most people cannot see them. Maybe that's a good thing because if we saw them as buildings, we'd deem many of them unsafe.

          J Offline
          J Offline
          Jorgen Andersson
          wrote on last edited by
          #4

          Can you fill us in a bit more on how the network is configured? And why some of them can't see each other? Love your sig by the way.

          I 1 Reply Last reply
          0
          • J Jorgen Andersson

            Can you fill us in a bit more on how the network is configured? And why some of them can't see each other? Love your sig by the way.

            I Offline
            I Offline
            Ian Uy
            wrote on last edited by
            #5

            PC A is in domain A. PC C is in domain C. Domain C is a "Secure Network" wherein only authorized people can access the domain. PC A is sort-of a "Public Domain". PC B is sort-of a "gatekeeper". In order to access computers on Domain C, you must first connect to PC B. So if I'm using PC A and I want to transfer files to PC C, I must first need to copy the files to PC B, and instruct PC B to transfer the files to PC C. Any suggestions?

            It is said that the most complex structures built by mankind are software systems. This is not generally appreciated because most people cannot see them. Maybe that's a good thing because if we saw them as buildings, we'd deem many of them unsafe.

            J 1 Reply Last reply
            0
            • I Ian Uy

              I have 3 PCS. PC A can access PC B but not PC C. In the same way, PC C can access PC B but not PC A. PC A <-> PC B <-> PC C So if I want to transfer files from A to C, I need to first store it in B then let B transfer the files to C or instruct C to get the files from B. What can you guys suggest is the EASIEST way to accomplish this? Thanks! :)

              It is said that the most complex structures built by mankind are software systems. This is not generally appreciated because most people cannot see them. Maybe that's a good thing because if we saw them as buildings, we'd deem many of them unsafe.

              S Offline
              S Offline
              sajjy
              wrote on last edited by
              #6

              it storngly depends on the network design it might that there is a problem in connecting pc A and pc B i think that it`s good to chek the connections first :)

              1 Reply Last reply
              0
              • I Ian Uy

                PC A is in domain A. PC C is in domain C. Domain C is a "Secure Network" wherein only authorized people can access the domain. PC A is sort-of a "Public Domain". PC B is sort-of a "gatekeeper". In order to access computers on Domain C, you must first connect to PC B. So if I'm using PC A and I want to transfer files to PC C, I must first need to copy the files to PC B, and instruct PC B to transfer the files to PC C. Any suggestions?

                It is said that the most complex structures built by mankind are software systems. This is not generally appreciated because most people cannot see them. Maybe that's a good thing because if we saw them as buildings, we'd deem many of them unsafe.

                J Offline
                J Offline
                Jorgen Andersson
                wrote on last edited by
                #7

                I assume that PC B is having two network cards with one card connected to network A and the other card to network C. And that PC B is belonging to either or neither domain. But the fact that computers in both domains are having access to the "Bridge" computer makes the whole concept doubtful at the best... I would have a talk to the network architect how you're supposed to use the network. Until then you can take a look at Robocopy which is a standard feature on Server 2008 and available in the resource kit for the prior versions. Run robocopy /? for some help on the usage. An interesting feature is the /MIR switch

                I 1 Reply Last reply
                0
                • J Jorgen Andersson

                  I assume that PC B is having two network cards with one card connected to network A and the other card to network C. And that PC B is belonging to either or neither domain. But the fact that computers in both domains are having access to the "Bridge" computer makes the whole concept doubtful at the best... I would have a talk to the network architect how you're supposed to use the network. Until then you can take a look at Robocopy which is a standard feature on Server 2008 and available in the resource kit for the prior versions. Run robocopy /? for some help on the usage. An interesting feature is the /MIR switch

                  I Offline
                  I Offline
                  Ian Uy
                  wrote on last edited by
                  #8

                  You got it exactly right. Right now I am using PSEXEC but I am thinking of developing a remote execution tool. :)

                  It is said that the most complex structures built by mankind are software systems. This is not generally appreciated because most people cannot see them. Maybe that's a good thing because if we saw them as buildings, we'd deem many of them unsafe.

                  J 1 Reply Last reply
                  0
                  • I Ian Uy

                    You got it exactly right. Right now I am using PSEXEC but I am thinking of developing a remote execution tool. :)

                    It is said that the most complex structures built by mankind are software systems. This is not generally appreciated because most people cannot see them. Maybe that's a good thing because if we saw them as buildings, we'd deem many of them unsafe.

                    J Offline
                    J Offline
                    Jorgen Andersson
                    wrote on last edited by
                    #9

                    I just don't see the point with a "secure network" if you want to be able to remote execute from the outside. I would exchange this "PC B" for a firewall that is closed for everything on the outside, and allow a limited amount of services to access the outside to FETCH files.

                    1 Reply Last reply
                    0
                    • I Ian Uy

                      I have 3 PCS. PC A can access PC B but not PC C. In the same way, PC C can access PC B but not PC A. PC A <-> PC B <-> PC C So if I want to transfer files from A to C, I need to first store it in B then let B transfer the files to C or instruct C to get the files from B. What can you guys suggest is the EASIEST way to accomplish this? Thanks! :)

                      It is said that the most complex structures built by mankind are software systems. This is not generally appreciated because most people cannot see them. Maybe that's a good thing because if we saw them as buildings, we'd deem many of them unsafe.

                      R Offline
                      R Offline
                      Roger Wright
                      wrote on last edited by
                      #10

                      You're trying to violate the security of a network that is designed to prevent you from accessing it. There's probably a good reason for that. The "right" way to do this is to establish trust relationships between the two domains, but your admin has chosen not to do so. It may be that, though it is inconvenient for you, the best choice for your organization is to continue using the tedious method. Another choice might be to establish an account in the remote domain for yourself that includes transferring files into the domain from outside. Remote Access priveleges can be established that will allow you to log on to the other domain from the local and make transfers oer that connection.

                      "A Journey of a Thousand Rest Stops Begins with a Single Movement"

                      1 Reply Last reply
                      0
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Don't have an account? Register

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups