Logo
PREGNANCY
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
 
 
Windows Vista

Accessing and Using Your Network : Sharing Resources with the Network (part 3) - Hiding Shared Resources

7/26/2013 6:01:00 PM

5. Hiding Shared Resources

Hiding your valuables is a time-tested method of securing them from prying eyes and would-be thieves. When you share a resource on your network, however, you’re displaying that resource for all to see. Sure, you can set up password-protected user accounts and set the appropriate permissions for the resource, but others will still be able to see that the resource is shared.

To prevent this situation, it’s possible to share a resource and hide it at the same time. It’s also extremely easy to do: When you set up the shared resource, add a dollar sign ($) to the end of the share name. For example, if you’re setting up drive F for sharing, you could use F$ as the share name. This prevents the resource from appearing in the list of resources when you open a remote computer from the Network window.

In Figure 3, for example, you see the properties sheet for drive F, which shows the drive is shared with the following path:

\\Paulspc\f$

Figure 3. Hidden shared resources (such as drive F shown here) don’t appear in the browse list.

That is, the drive is shared on PaulsPC with the name F$. However, in the folder window, you can see that drive F doesn’t appear in the list of resources shared by PaulsPC.

Hidden Administration Shares

Hiding shares will work for the average user, but a savvy snoop will probably know about the $ trick. Therefore, you’ll probably want to set up your hidden shares with nonobvious names. Note, however, that Windows Vista sets up certain hidden shares for administrative purposes, including one for drive C (C$) and any other hard disk partitions you have on your system. Windows Vista also sets up the following hidden shares:

Share NameShared PathPurpose
ADMIN$%SystemRoot%Remote administration
IPC$N/ARemote interprocess communication
print$%SystemRoot%\System32\spool\driversAccess to printer drivers

You cannot delete or rename these administrative shares.


How do you connect to a hidden share? Well, you need to know the name of the shared resource, of course. When you know that, you can use any of the following techniques:

  • Select Windows Logo+R (or select Start, All Programs, Accessories, Run) to open the Run dialog box, type the UNC path for the hidden resource, and click OK. For example, to display the hidden share F$ on PaulsPC, you would enter this:

    \\paulspc\f$
  • In a Command Prompt session, type start, a space, the UNC path, and then press the Enter key. For example, to launch the hidden share F$ on PaulsPC, you would enter this:

    start \\paulspc\f$
  • Use the Map Network Drive command. In the Map Network Drive dialog box, type the UNC path for the hidden share in the Folder text box.

  • For a hidden shared printer, when Vista begins searching for available printers, click The Printer That I Want Isn’t Listed. In the Find a Printer By Name or TCP/IP Address dialog box, type the UNC path to the hidden printer in the Select a Shared Printer By Name text box.

Other -----------------
- Accessing and Using Your Network : Accessing Network Resources
- Accessing and Using Your Network : Learning Some Common Network Tasks
- Collecting Vista Events
- Automating Vista Events
- Exploring the Vista Task Scheduler
- Tracking Change in Vista : Turning on the audit policy, Exploring the Vista Event Log
- Managing Change through Group Policy (part 4) - Assigning PC-Related GPOs, Troubleshooting and monitoring Group Policy
- Managing Change through Group Policy (part 3) - Working with GPO tools
- Managing Change through Group Policy (part 2) - Working with central policies
- Managing Change through Group Policy (part 1) - Working with Local Policies
- Securing the Workstation : Applying the Castle Defense System (part 7) - Working with external access - Working with Public Key Infrastructures, Working with Virtual Private Network connections
- Securing the Workstation : Applying the Castle Defense System (part 6) - Working with external access - Working with the Windows Firewall with Advanced Security
- Securing the Workstation : Applying the Castle Defense System (part 5) - Managing information access
- Securing the Workstation : Applying the Castle Defense System (part 4) - Hardening the system - USB Device Control, Windows Defender
- Securing the Workstation : Applying the Castle Defense System (part 3) - Hardening the system - User Account Control
- Securing the Workstation : Applying the Castle Defense System (part 2) - Hardening the system - Local Security Policy and security configurations
- Securing the Workstation : Applying the Castle Defense System (part 1) - Protecting information, Working with protection
- Participating in Internet Newsgroups : Setting News Options - Options for Newsgroups and Messages, Options for Individual Newsgroups
- Participating in Internet Newsgroups : Filtering Newsgroup Messages, Rating Posts
- Participating in Internet Newsgroups : Notes on Working with Newsgroup Messages, Following Up a Message, Posting a New Message
 
 
Most view of day
- SQL Server 2012 : Running SQL Server in A Virtual Environment - EXTENDED FEATURES OF VIRTUALIZATION
- What's new and improved in SharePoint 2013 : Creating an asset library
- Microsoft Access 2010 : Creating Relationships Between Tables
- Securing Your SharePoint and Windows Azure Solutions : Configuring Shared Access Permissions for BLOB Storage - Using Claims-Based Authentication
- Windows Server 2003 on HP ProLiant Servers : Migration Case Studies (part 1) - County Government Office
- Managing Client Protection : User Account Control (part 1) - UAC for Standard Users, UAC for Administrators
- Micorosoft Sharepoint 2013 : SharePoint Metadata Types (part 3) - Metadata in Lists
- Developing Disk Images : Capturing a Disk Image for LTI, Capturing a Disk Image for ZTI
- Extending Dynamics GP with Free Software : Checking Dynamics GP spelling with Willoware
- Microsoft Visio 2010 : Linking External Data to Shapes (part 3) - Using the Database Wizard - Setting Up the Excel File as a Data Source
Top 10
- MDT's Client Wizard : Package Properties
- MDT's Client Wizard : Driver Properties
- MDT's Client Wizard : Application Properties
- MDT's Client Wizard : Operating System Properties
- MDT's Client Wizard : Customizing the Deployment Share
- Windows Server 2012 : Software and User Account Control Administration (part 5) - Maintaining application integrity - Configuring run levels
- Windows Server 2012 : Software and User Account Control Administration (part 4) - Maintaining application integrity - Application access tokens
- Windows Server 2012 : Software and User Account Control Administration (part 3) - Mastering User Account Control - Configuring UAC and Admin Approval Mode
- Windows Server 2012 : Software and User Account Control Administration (part 2) - Mastering User Account Control - Elevation, prompts, and the secure desktop
- Windows Server 2012 : Software and User Account Control Administration (part 1) - Software installation essentials
 
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
2015 Camaro