{"id":314,"date":"2007-07-14T07:30:27","date_gmt":"2007-07-14T12:30:27","guid":{"rendered":"http:\/\/www.trustyetc.com\/trustyblog\/2007\/07\/14\/efficiency-tip-81-share\/"},"modified":"2015-05-14T09:12:52","modified_gmt":"2015-05-14T14:12:52","slug":"efficiency-tip-81-share","status":"publish","type":"post","link":"https:\/\/www.trustyetc.com\/trustyblog\/2007\/07\/14\/efficiency-tip-81-share\/","title":{"rendered":"Efficiency Tip #81 &#8211; Share"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" align=\"right\" width=\"240\" src=\"http:\/\/farm1.static.flickr.com\/41\/117316631_1393ed55b0_m.jpg\" height=\"180\" style=\"width: 240px; height: 180px\" \/>Many households now have more than one computer.\u00a0 More people are buying a laptop to go with family desktop.\u00a0 Add a router and you have a network.\u00a0 Once you have a network, there is no reason to use &#8220;<a target=\"_blank\" href=\"http:\/\/en.wikipedia.org\/wiki\/Sneakernet\">Sneakernet<\/a>&#8221; to move your files from one computer to another.<\/p>\n<p>Turn on <a target=\"_blank\" href=\"http:\/\/support.microsoft.com\/kb\/304040\">File Sharing<\/a>.\u00a0 This will let you get to files on Computer 1 from Computer 2.<\/p>\n<p>Depending on your needs, you can control the access of network users to resources that are shared.\u00a0 The control falls into two general categories and is &#8220;set&#8221; by the computer doing the sharing.<\/p>\n<p>Read<br \/>\nRead &amp; Write<\/p>\n<p><strong>Read<\/strong> access permits a network user to open a file for viewing, but the network user cannot change or delete the file.\u00a0 If the network user has <strong>Read and Write<\/strong> access, the network user can view, change and even delete the file.<\/p>\n<p>I share all my music and photos over the home network in Read mode.\u00a0 I don&#8217;t want someone accidentally deleting something.\u00a0 If a network user wants to modify a photo, that photo can be <strong>copied<\/strong> to a computer where the copy can be changed, but the original is unaltered.<\/p>\n<p>Sharing files on your home network does not share them with people on the Internet if you have a router\/firewall.\u00a0 Someone would have to break into your home network to get to your shared files.\u00a0 An added layer of protection is to require a valid username\/password for network users to access files that are shared.\u00a0 In this way, a user not only has to be on the network, but also has to know a working username and password on the computer sharing the files.<\/p>\n<p>Behind a firewall, your shared files are pretty safe from the Internet.<\/p>\n<p>TSPY=2.22<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Many households now have more than one computer.\u00a0 More people are buying a laptop to go with family desktop.\u00a0 Add a router and you have a network.\u00a0 Once you have a network, there is no reason to use &#8220;Sneakernet&#8221; to &hellip; <a href=\"https:\/\/www.trustyetc.com\/trustyblog\/2007\/07\/14\/efficiency-tip-81-share\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,4],"tags":[336,338],"class_list":["post-314","post","type-post","status-publish","format-standard","hentry","category-edtech","category-efficiency","tag-edtech","tag-efficiency"],"_links":{"self":[{"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/posts\/314","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/comments?post=314"}],"version-history":[{"count":1,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/posts\/314\/revisions"}],"predecessor-version":[{"id":1434,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/posts\/314\/revisions\/1434"}],"wp:attachment":[{"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/media?parent=314"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/categories?post=314"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/tags?post=314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}