Common methods for security protection of LAN shared resources

Source: Internet
Author: User
Tags resource password protection

In the virtual world of cyberspace, all the sinister and despicable things in real life are shown at a glance, in the information age, almost everyone is faced with security threats, it is necessary to understand the network security, and can deal with some security issues, those who usually do not pay attention to the safety of people, often pay a heavy price when they will regret unceasingly.

The following author introduces several protection of the shared resources in the local area network security techniques, hoping to bring help to everyone.

Everyone in the Windows LAN, sometimes in order to be able to achieve the common use of some resources, can often create a share of the resources need to achieve a shared name, and then need to use the shared resources of users through the network in the local area of the LAN function, to achieve access to shared resources. Although sharing can bring us operational convenience, it is undeniable that it also poses a security threat to us. Some unscrupulous users can use the shared functionality to arbitrarily delete, change, or destroy resources on other computers in the local area network. To secure a shared resource, we can set the shared password at the window's shared-level system, while also setting the access type of the shared folder to read-only or full to ensure its security. For example, to securely share a folder that contains important information, you can set password protection for the folder, set access permissions, and only tell the password to specific users.

Even if we set the access password for the shared resource, however, every user in the local area network can still see the shared resource in the "Network Neighborhood", and today, these access codes are virtually non-existent in front of the advanced hackers, so we should never consider it safe to set the password.

So what can we do to ensure relative security? Users who have used NT may know that NT creates a shared name like "C $" by default, but we don't see the C folder in the Network Neighborhood, which means that the "$" symbol can hide the shared folder; So here we can also use this method, When you set the share name for a resource that you want to share, you only have to append a dollar sign ($) to the share name. After you set up your share name, and then open My Network Places, you will find that the shared resource you are setting is not available now, and even if you are a hacker, you won't be able to destroy the shared resource.

Use $ to set the share name adds a powerful barrier to securing shared resources, and any access restrictions or passwords for that shared resource are still valid. Below, the author takes the practical example to explain this technique application situation hypothesis, the author needs to set up a shared folder in a computer in a local area network, and the shared folder that requests the setting cannot let other users see, only lets specify user B to access. To do this, we can follow the steps below:

1, first A in the computer to find the need to share a resource folder, for example, we assume that the E-Disk Famen folder resources shared to B use.

2, then on the Famen folder, with the right mouse click, from the next pop-up right-click menu select the "Sharing" command, the program will open a Settings dialog box.

3, in the Settings dialog box has two tabs, where the "General" tab can help us to learn more about the shared folder in various aspects of parameter information, for example, folder size, location, creation time, and file attributes; Under the Sharing tab, we can click the Radio box in front of the "share as" option with the mouse, and in the share name text box, enter a name that ends with "$", such as entering famen$.

4, then we in the "Access type" settings, according to their own needs to set the level of sharing, the system provides a total of 3 types of access, respectively, read-only, complete and based on password access, where we choose the "Access according to password" option.

5, once the "Access according to password" option, the "Full access password" text box will be activated, and finally in the corresponding text box to enter the access password, and finally click the "OK" button to exit the Sharing dialog box. Displays a folder with the share name secret$ and shared as full access based on the password.

Once you've set up a shared folder, we open the Network Neighborhood window in Computer B and find a computer in the window, and double-click the icon for a computer with the mouse, but in the window below we find that the shared folder is not famen$ in computer A, so how do we access it? The following are the specific access steps:

1. To access a shared folder, you typically simply select the host system in the Network Places list, and then find and access the folder. We first on the B computer desktop, with the mouse double-click the "Network Neighborhood" icon, open the Network Neighborhood window, find a computer icon. Because famen$ is hidden, we cannot find famen$ directly in the list of shared directories. 2, in order to be able to access this hidden shared folder, we must take advantage of the "Image network Drive" feature to achieve. However, in the Win9x system default setting, the "Image network Drive" feature does not appear in the toolbar, and we have to set it to display it in the toolbar. We just select "View/Folder Options" in the menu bar, click the "View" tab after the Folder Options dialog box appears, and select the "Show Image Network drive button in the sidebar" checkbox, then click OK.

3. Below, we can click the "Image network Drive" command button in the toolbar directly with the mouse, the system opens a settings dialog titled "Image Network Drive," where you enter the network path and share name in UNC format in the Path text box of the dialog box, and add the path and share named "\\A\ famen$ ".

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.