SlideShare a Scribd company logo
1 of 20
NETWORKING IN WINDOWS
Common Terms
 Work Group
 Computer Name
What is a Workgroup
The workgroup is a collection of computers that are
part of the same network. All the computers are
peers and do not have control over another computer.
The workgroup facilitates the detection of the
computers that are part of it and the sharing of
resources like folders or printers.
Workgroups are not protected by the use of a password
and they can be created only for computers that are
part of the same local network. They are designed for
small networks like those found in your home or small
businesses
What is the Computer Name
 Every operating system asks you to give a
computer name when you install it on a PC or
device. Windows is no exception to this rule.
That’s because this name is important to identify
the computer when it is part of a network.
 Your computer’s name can be learned by going
to “Control Panel > System and Security >
System”. There you will find a section named
“Computer name, domain, and workgroup
settings”. Look for the entry named “Computer
name”.
Windows Network Sharing
User Accounts, Groups, Permissions & Their Role in Sharing
User Accounts
 A user account is a collection of settings and information that tells Windows
which files and folders you can access, what you can do on your computer,
what are your preferences, and what network resources you can access when
connected to a network.
 The user account allows you to authenticate to Windows or any other operating
system so that you are granted authorization to use them. Multi-user operating
systems such as Windows don’t allow a user to use them without having a user
account.
 In Windows, you can manage your computer’s user accounts by going to the
“Control Panel” and then to “User Accounts and Family Safety > User
Accounts.”
A user account in Windows is characterized by the following attributes:
User name – the name you are giving to that account.
Password – the password associated with the user account (in Windows 7 or older
versions you can also use blank passwords).
User group – a collection of user accounts that share the same security rights and
permissions. A user account must be a member of at least one user group.
Type – all user accounts have a type which defines their permissions and what
they can do in Windows.
Administrator
The “Administrator” user account has complete control
over the PC. He or she can install anything and make
changes that affect all users of that PC.
Standard
The “Standard” user account can only use the software
that’s already installed by the administrator and
change system settings that don’t affect other users.
Guest
The “Guest” account is a special type of user account
that has the name Guest and no password. This is
only for users that need temporary access to the PC.
This user can only use the software that’s already
installed by the administrator and cannot make any
changes to system settings.
ADMINISTRATOR, STANDARD AND
ACCOUNT
 What is a User Group?
As mentioned earlier, the user group is a collection of user accounts that share
the same security rights and permissions.
Customizing Your Network Sharing Settings
 o find them, go to the “Control Panel > Network and Internet” and then to
“Network and Sharing Center”. This window is very important when it comes to
setting up your network connections and network sharing. Here you will find
the options for changing your network adapter settings, a link to all network
sharing settings, and wizards for setting up new connections or
troubleshooting problems.
 To access your network sharing settings, click or tap the “Change advanced
sharing settings” link on the left column.
Now you will see a list with all the available network sharing settings that are
found in Windows, grouped by network location.
Network discovery
This setting makes Windows search for other computers and devices on the
network and broadcasts your computer on the network, so that others see it.
“Network discovery” should be turned on in order for your computer to access
other computers on the network and be able to share things with them.
What is the Public Folder
 The Public folder is a folder that’s found on all Windows
computers by going to “C:UsersPublic”.
 All the user accounts that exist on your Windows PC or
device have access to it. Also, all network computers and
devices may have access to it, depending on how you have
set your network and sharing settings
 This “Public” folder has several subfolders, including
several hidden ones.
 The idea of the “Public” folder, is that anything you copy
into this folder and its subfolders is shared both with other
user accounts on your computer, and with other computers
and devices on the network. You make things simple by
putting the music you want to share in the “Public Music”
folder, the documents you want to share in the “Public
Documents” folder, and so on.
 Anyone can read, write or delete everything that’s found in
the “Public” folder and its subfolders. Therefore, you should
not use those folders to store files that you want to share
only with certain people or only one user account. For that
you should use the other sharing methods that will be
shown in upcoming lessons.
Why Would You Share Something Using the Public
Folder?
Using the “Public” folder makes sense in the following
scenarios:
 You want to share specific files with other user
accounts on the same computer or device.
 You want to give someone access to a file or a set of
files but not to entire libraries or folders. For
example, you may want to share a set of documents
but you don’t want to share your entire Documents
library. Copying those documents to the “Public”
folder is an easy and fast way to share them, without
giving others access to your other work.
 The person doing the sharing is not very technical
and he or she has a hard time understanding how
everything works. The “Public” folder is a simple
concept and you can train them to simply drop there
everything that they want to share.
How to Stop Sharing with the Public Folder
 Turning off the use of the “Public” folder is
possible only when dealing with network sharing.
You can set it so that it is no longer available to
other network computers or devices. However,
you cannot set it so that it is not accessible to
the user accounts existing on your computer. If
you want to stop sharing with them through the
use of this folder, simply delete everything you
have stored inside.
 If you want to disable the use of the Public folder
for network sharing, go to the Network and
Sharing Center and click or tap “Change
advanced sharing settings” on the left. Find
the Public folder sharing setting for the active
network location, set it to “Turn off Public folder
sharing” and press “Save changes”.
What is Advanced Sharing in Windows?
 Advanced Sharing is one way of sharing
resources in Windows. It allows for detailed
customization of the way you are sharing and it
has the following characteristics:
 You can use it to share folders, external hard
drives and internal drives (your partitions, Blu-
Ray or DVD drives).
 You can use it to deny access to a specific
resource for a specific user account or user
group.
 You can use it to limit the number of
simultaneous users accessing a shared resource.
 You can use it to share resources with one or
more share names.
 You cannot use “Advanced Sharing” for sharing
libraries or printers.
What Are Network Drives and Network
Locations
 In order to access shared network resources
more efficiently, you can create a shortcut to
a folder shared by another PC or device on
the network. The process for creating this
type of shortcut is called mapping a network
drive. A mapped network drive has the
following characteristics:
 It has a drive letter assigned like any other
partition in your system.
 It points to a network shared folder.
 It points only to resources found on your
network.
 You need the appropriate credentials to
connect to it.
You can also create shortcuts to a web resources like a
web share or an FTP server. The process for creating
this type of shortcut is named creating a network
location. A network location has the following
characteristics:
 It is a shortcut to a web location like a website or FTP
site.
 It can point to either external resources found on the
Internet and to resources found in your
network/intranet.
 You need the appropriate credentials to connect to it.
 It doesn’t have a driver letter assigned.
 Both network drives and network locations are stored
individually for each user account. They are available
only from the user account that has created them and
they are not available for all the users on the same
Windows computer or device.
How to Share Your Printer with the
Homegroup
 Sharing your local printer with the
Homegroup is incredibly easy. In Windows
8.x, go to PC Settings and then to
“Network > HomeGroup”. There you will
find several switches for sharing with the
Homegroup.
 Find the one named “Printers” and set it
to “On”.
 To remove this setting Find the one
named “Printers” and set it to “Off”.
The Trouble with Sharing Local Printers or Why You Should
Use Wireless Printers
 Back in the Windows XP era, local printers were the norm in the
consumer space. Only businesses with lots of employees had
network printers to which entire offices could print to.
 In recent years, wireless printers have become very affordable
and commonplace. You can find lots of models at many price
points in any decent computer store. We recommend you to
purchase and install a wireless printer in your home network. This
will help avoid lots of annoyances that are common when using a
local printer that is shared with the network.
 Computers on the network can view and use the shared printer
only when both the printer and the computer that it is attached to
are turned on.
 Installing a shared network printer involves more steps and it is
more error prone than installing a modern wireless printer. You
can encounter problems with conflicting network sharing settings,
permissions and so on.
 The printing process is faster because it doesn’t involve sending
data to another computer before getting it printed.
 Printing from local printers can be done only from computers that
are part of the network but not from tablets or smartphones.
WINDOWS NETWORKING GUIDE - WORKGROUPS, COMPUTER NAMES, USER ACCOUNTS

More Related Content

What's hot

Linux ppt
Linux pptLinux ppt
Linux pptlincy21
 
Operating system concepts (notes)
Operating system concepts (notes)Operating system concepts (notes)
Operating system concepts (notes)Sohaib Danish
 
Operating system security
Operating system securityOperating system security
Operating system securitySarmad Makhdoom
 
Memory management
Memory managementMemory management
Memory managementcpjcollege
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network servicesUc Man
 
Disk and File System Management in Linux
Disk and File System Management in LinuxDisk and File System Management in Linux
Disk and File System Management in LinuxHenry Osborne
 
Distributed operating system(os)
Distributed operating system(os)Distributed operating system(os)
Distributed operating system(os)Dinesh Modak
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating SystemsDamian T. Gordon
 
Operating Systems: Process Scheduling
Operating Systems: Process SchedulingOperating Systems: Process Scheduling
Operating Systems: Process SchedulingDamian T. Gordon
 
Process scheduling (CPU Scheduling)
Process scheduling (CPU Scheduling)Process scheduling (CPU Scheduling)
Process scheduling (CPU Scheduling)Mukesh Chinta
 

What's hot (20)

Linux file system
Linux file systemLinux file system
Linux file system
 
Linux ppt
Linux pptLinux ppt
Linux ppt
 
Operating system concepts (notes)
Operating system concepts (notes)Operating system concepts (notes)
Operating system concepts (notes)
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Operating system
Operating systemOperating system
Operating system
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
 
Memory management
Memory managementMemory management
Memory management
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
 
Disk and File System Management in Linux
Disk and File System Management in LinuxDisk and File System Management in Linux
Disk and File System Management in Linux
 
Demand paging
Demand pagingDemand paging
Demand paging
 
Os Threads
Os ThreadsOs Threads
Os Threads
 
Process threads operating system.
Process threads operating system.Process threads operating system.
Process threads operating system.
 
Linux systems - Linux Commands and Shell Scripting
Linux systems - Linux Commands and Shell ScriptingLinux systems - Linux Commands and Shell Scripting
Linux systems - Linux Commands and Shell Scripting
 
Pthread
PthreadPthread
Pthread
 
Linux
LinuxLinux
Linux
 
Distributed operating system(os)
Distributed operating system(os)Distributed operating system(os)
Distributed operating system(os)
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
VIRTUAL MEMORY
VIRTUAL MEMORYVIRTUAL MEMORY
VIRTUAL MEMORY
 
Operating Systems: Process Scheduling
Operating Systems: Process SchedulingOperating Systems: Process Scheduling
Operating Systems: Process Scheduling
 
Process scheduling (CPU Scheduling)
Process scheduling (CPU Scheduling)Process scheduling (CPU Scheduling)
Process scheduling (CPU Scheduling)
 

Similar to WINDOWS NETWORKING GUIDE - WORKGROUPS, COMPUTER NAMES, USER ACCOUNTS

Ubuntu getting started
Ubuntu getting startedUbuntu getting started
Ubuntu getting startedErnesto Celis
 
Class 6 computer part 2
Class 6 computer part 2Class 6 computer part 2
Class 6 computer part 2Jeevan Subedi
 
01. english version operating system
01. english version   operating system01. english version   operating system
01. english version operating systemJimmi Sitorus
 
Operating system windows XP
Operating system windows XPOperating system windows XP
Operating system windows XPRohan Bhatkar
 
ITC 3001, Personal Computer Fundamentals 1 Course Lea.docx
 ITC 3001, Personal Computer Fundamentals 1 Course Lea.docx ITC 3001, Personal Computer Fundamentals 1 Course Lea.docx
ITC 3001, Personal Computer Fundamentals 1 Course Lea.docxMARRY7
 
Training Computer
Training ComputerTraining Computer
Training Computercmonasmith
 
29041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-200329041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-2003rafiq123
 
Microsoft windows operating concept
Microsoft windows operating conceptMicrosoft windows operating concept
Microsoft windows operating conceptMi L
 
Windows registry troubleshooting (2015)
Windows registry troubleshooting (2015)Windows registry troubleshooting (2015)
Windows registry troubleshooting (2015)James Konol
 
Operating systems and networks
Operating systems and networksOperating systems and networks
Operating systems and networkscarmenpuigdueta
 
Opeating system programs
Opeating system programsOpeating system programs
Opeating system programsJotham Gadot
 
Tricks N Tips By Ravish Roshan
Tricks N Tips By Ravish RoshanTricks N Tips By Ravish Roshan
Tricks N Tips By Ravish Roshanravish roshan
 

Similar to WINDOWS NETWORKING GUIDE - WORKGROUPS, COMPUTER NAMES, USER ACCOUNTS (20)

Ubuntu getting started
Ubuntu getting startedUbuntu getting started
Ubuntu getting started
 
Module 2 b_win 7
Module 2 b_win 7Module 2 b_win 7
Module 2 b_win 7
 
Unit3
Unit3Unit3
Unit3
 
Class 6 computer part 2
Class 6 computer part 2Class 6 computer part 2
Class 6 computer part 2
 
01. english version operating system
01. english version   operating system01. english version   operating system
01. english version operating system
 
Operating system windows XP
Operating system windows XPOperating system windows XP
Operating system windows XP
 
Edubooktraining
EdubooktrainingEdubooktraining
Edubooktraining
 
Definitions
DefinitionsDefinitions
Definitions
 
ITC 3001, Personal Computer Fundamentals 1 Course Lea.docx
 ITC 3001, Personal Computer Fundamentals 1 Course Lea.docx ITC 3001, Personal Computer Fundamentals 1 Course Lea.docx
ITC 3001, Personal Computer Fundamentals 1 Course Lea.docx
 
Training Computer
Training ComputerTraining Computer
Training Computer
 
29041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-200329041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-2003
 
Microsoft windows operating concept
Microsoft windows operating conceptMicrosoft windows operating concept
Microsoft windows operating concept
 
Windows registry troubleshooting (2015)
Windows registry troubleshooting (2015)Windows registry troubleshooting (2015)
Windows registry troubleshooting (2015)
 
Presentation gggffggggg.pdf
Presentation                     gggffggggg.pdfPresentation                     gggffggggg.pdf
Presentation gggffggggg.pdf
 
Download It
Download ItDownload It
Download It
 
Mke15
Mke15Mke15
Mke15
 
Operating systems and networks
Operating systems and networksOperating systems and networks
Operating systems and networks
 
Opeating system programs
Opeating system programsOpeating system programs
Opeating system programs
 
Linux Recovery
Linux RecoveryLinux Recovery
Linux Recovery
 
Tricks N Tips By Ravish Roshan
Tricks N Tips By Ravish RoshanTricks N Tips By Ravish Roshan
Tricks N Tips By Ravish Roshan
 

More from Mohammed Adam

Android Penetration Testing - Day 3
Android Penetration Testing - Day 3Android Penetration Testing - Day 3
Android Penetration Testing - Day 3Mohammed Adam
 
Android Penetration testing - Day 2
 Android Penetration testing - Day 2 Android Penetration testing - Day 2
Android Penetration testing - Day 2Mohammed Adam
 
Android Penetration Testing - Day 1
Android Penetration Testing - Day 1Android Penetration Testing - Day 1
Android Penetration Testing - Day 1Mohammed Adam
 
Wireless Penetration Testing
Wireless Penetration TestingWireless Penetration Testing
Wireless Penetration TestingMohammed Adam
 
Network Penetration Testing
Network Penetration TestingNetwork Penetration Testing
Network Penetration TestingMohammed Adam
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For CybersecurityMohammed Adam
 
Golden Ticket Attack - AD - Domain Persistence
Golden Ticket Attack - AD - Domain PersistenceGolden Ticket Attack - AD - Domain Persistence
Golden Ticket Attack - AD - Domain PersistenceMohammed Adam
 
Evading Antivirus software for fun and profit
Evading Antivirus software for fun and profitEvading Antivirus software for fun and profit
Evading Antivirus software for fun and profitMohammed Adam
 
Introduction to Network Fundamentals
Introduction to Network FundamentalsIntroduction to Network Fundamentals
Introduction to Network FundamentalsMohammed Adam
 
Breaking out of crypto authentication
Breaking out of crypto authenticationBreaking out of crypto authentication
Breaking out of crypto authenticationMohammed Adam
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamMohammed Adam
 
Career Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamMohammed Adam
 
Introduction to null villupuram community
Introduction to null villupuram communityIntroduction to null villupuram community
Introduction to null villupuram communityMohammed Adam
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamMohammed Adam
 
Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Mohammed Adam
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityMohammed Adam
 
Android Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed AdamAndroid Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed AdamMohammed Adam
 
Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Mohammed Adam
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolMohammed Adam
 

More from Mohammed Adam (20)

Android Penetration Testing - Day 3
Android Penetration Testing - Day 3Android Penetration Testing - Day 3
Android Penetration Testing - Day 3
 
Android Penetration testing - Day 2
 Android Penetration testing - Day 2 Android Penetration testing - Day 2
Android Penetration testing - Day 2
 
Android Penetration Testing - Day 1
Android Penetration Testing - Day 1Android Penetration Testing - Day 1
Android Penetration Testing - Day 1
 
Wireless Penetration Testing
Wireless Penetration TestingWireless Penetration Testing
Wireless Penetration Testing
 
Network Penetration Testing
Network Penetration TestingNetwork Penetration Testing
Network Penetration Testing
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
 
Golden Ticket Attack - AD - Domain Persistence
Golden Ticket Attack - AD - Domain PersistenceGolden Ticket Attack - AD - Domain Persistence
Golden Ticket Attack - AD - Domain Persistence
 
Evading Antivirus software for fun and profit
Evading Antivirus software for fun and profitEvading Antivirus software for fun and profit
Evading Antivirus software for fun and profit
 
Introduction to Network Fundamentals
Introduction to Network FundamentalsIntroduction to Network Fundamentals
Introduction to Network Fundamentals
 
Breaking out of crypto authentication
Breaking out of crypto authenticationBreaking out of crypto authentication
Breaking out of crypto authentication
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Career Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed Adam
 
Introduction to null villupuram community
Introduction to null villupuram communityIntroduction to null villupuram community
Introduction to null villupuram community
 
Internet security
Internet securityInternet security
Internet security
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
 
Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 
Android Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed AdamAndroid Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed Adam
 
Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
 

Recently uploaded

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

WINDOWS NETWORKING GUIDE - WORKGROUPS, COMPUTER NAMES, USER ACCOUNTS

  • 2. Common Terms  Work Group  Computer Name
  • 3. What is a Workgroup The workgroup is a collection of computers that are part of the same network. All the computers are peers and do not have control over another computer. The workgroup facilitates the detection of the computers that are part of it and the sharing of resources like folders or printers. Workgroups are not protected by the use of a password and they can be created only for computers that are part of the same local network. They are designed for small networks like those found in your home or small businesses
  • 4.
  • 5. What is the Computer Name  Every operating system asks you to give a computer name when you install it on a PC or device. Windows is no exception to this rule. That’s because this name is important to identify the computer when it is part of a network.  Your computer’s name can be learned by going to “Control Panel > System and Security > System”. There you will find a section named “Computer name, domain, and workgroup settings”. Look for the entry named “Computer name”.
  • 6.
  • 7. Windows Network Sharing User Accounts, Groups, Permissions & Their Role in Sharing User Accounts  A user account is a collection of settings and information that tells Windows which files and folders you can access, what you can do on your computer, what are your preferences, and what network resources you can access when connected to a network.  The user account allows you to authenticate to Windows or any other operating system so that you are granted authorization to use them. Multi-user operating systems such as Windows don’t allow a user to use them without having a user account.  In Windows, you can manage your computer’s user accounts by going to the “Control Panel” and then to “User Accounts and Family Safety > User Accounts.” A user account in Windows is characterized by the following attributes: User name – the name you are giving to that account. Password – the password associated with the user account (in Windows 7 or older versions you can also use blank passwords). User group – a collection of user accounts that share the same security rights and permissions. A user account must be a member of at least one user group. Type – all user accounts have a type which defines their permissions and what they can do in Windows.
  • 8.
  • 9. Administrator The “Administrator” user account has complete control over the PC. He or she can install anything and make changes that affect all users of that PC. Standard The “Standard” user account can only use the software that’s already installed by the administrator and change system settings that don’t affect other users. Guest The “Guest” account is a special type of user account that has the name Guest and no password. This is only for users that need temporary access to the PC. This user can only use the software that’s already installed by the administrator and cannot make any changes to system settings.
  • 11.  What is a User Group? As mentioned earlier, the user group is a collection of user accounts that share the same security rights and permissions. Customizing Your Network Sharing Settings  o find them, go to the “Control Panel > Network and Internet” and then to “Network and Sharing Center”. This window is very important when it comes to setting up your network connections and network sharing. Here you will find the options for changing your network adapter settings, a link to all network sharing settings, and wizards for setting up new connections or troubleshooting problems.  To access your network sharing settings, click or tap the “Change advanced sharing settings” link on the left column. Now you will see a list with all the available network sharing settings that are found in Windows, grouped by network location. Network discovery This setting makes Windows search for other computers and devices on the network and broadcasts your computer on the network, so that others see it. “Network discovery” should be turned on in order for your computer to access other computers on the network and be able to share things with them.
  • 12. What is the Public Folder  The Public folder is a folder that’s found on all Windows computers by going to “C:UsersPublic”.  All the user accounts that exist on your Windows PC or device have access to it. Also, all network computers and devices may have access to it, depending on how you have set your network and sharing settings  This “Public” folder has several subfolders, including several hidden ones.  The idea of the “Public” folder, is that anything you copy into this folder and its subfolders is shared both with other user accounts on your computer, and with other computers and devices on the network. You make things simple by putting the music you want to share in the “Public Music” folder, the documents you want to share in the “Public Documents” folder, and so on.  Anyone can read, write or delete everything that’s found in the “Public” folder and its subfolders. Therefore, you should not use those folders to store files that you want to share only with certain people or only one user account. For that you should use the other sharing methods that will be shown in upcoming lessons.
  • 13. Why Would You Share Something Using the Public Folder? Using the “Public” folder makes sense in the following scenarios:  You want to share specific files with other user accounts on the same computer or device.  You want to give someone access to a file or a set of files but not to entire libraries or folders. For example, you may want to share a set of documents but you don’t want to share your entire Documents library. Copying those documents to the “Public” folder is an easy and fast way to share them, without giving others access to your other work.  The person doing the sharing is not very technical and he or she has a hard time understanding how everything works. The “Public” folder is a simple concept and you can train them to simply drop there everything that they want to share.
  • 14. How to Stop Sharing with the Public Folder  Turning off the use of the “Public” folder is possible only when dealing with network sharing. You can set it so that it is no longer available to other network computers or devices. However, you cannot set it so that it is not accessible to the user accounts existing on your computer. If you want to stop sharing with them through the use of this folder, simply delete everything you have stored inside.  If you want to disable the use of the Public folder for network sharing, go to the Network and Sharing Center and click or tap “Change advanced sharing settings” on the left. Find the Public folder sharing setting for the active network location, set it to “Turn off Public folder sharing” and press “Save changes”.
  • 15. What is Advanced Sharing in Windows?  Advanced Sharing is one way of sharing resources in Windows. It allows for detailed customization of the way you are sharing and it has the following characteristics:  You can use it to share folders, external hard drives and internal drives (your partitions, Blu- Ray or DVD drives).  You can use it to deny access to a specific resource for a specific user account or user group.  You can use it to limit the number of simultaneous users accessing a shared resource.  You can use it to share resources with one or more share names.  You cannot use “Advanced Sharing” for sharing libraries or printers.
  • 16. What Are Network Drives and Network Locations  In order to access shared network resources more efficiently, you can create a shortcut to a folder shared by another PC or device on the network. The process for creating this type of shortcut is called mapping a network drive. A mapped network drive has the following characteristics:  It has a drive letter assigned like any other partition in your system.  It points to a network shared folder.  It points only to resources found on your network.  You need the appropriate credentials to connect to it.
  • 17. You can also create shortcuts to a web resources like a web share or an FTP server. The process for creating this type of shortcut is named creating a network location. A network location has the following characteristics:  It is a shortcut to a web location like a website or FTP site.  It can point to either external resources found on the Internet and to resources found in your network/intranet.  You need the appropriate credentials to connect to it.  It doesn’t have a driver letter assigned.  Both network drives and network locations are stored individually for each user account. They are available only from the user account that has created them and they are not available for all the users on the same Windows computer or device.
  • 18. How to Share Your Printer with the Homegroup  Sharing your local printer with the Homegroup is incredibly easy. In Windows 8.x, go to PC Settings and then to “Network > HomeGroup”. There you will find several switches for sharing with the Homegroup.  Find the one named “Printers” and set it to “On”.  To remove this setting Find the one named “Printers” and set it to “Off”.
  • 19. The Trouble with Sharing Local Printers or Why You Should Use Wireless Printers  Back in the Windows XP era, local printers were the norm in the consumer space. Only businesses with lots of employees had network printers to which entire offices could print to.  In recent years, wireless printers have become very affordable and commonplace. You can find lots of models at many price points in any decent computer store. We recommend you to purchase and install a wireless printer in your home network. This will help avoid lots of annoyances that are common when using a local printer that is shared with the network.  Computers on the network can view and use the shared printer only when both the printer and the computer that it is attached to are turned on.  Installing a shared network printer involves more steps and it is more error prone than installing a modern wireless printer. You can encounter problems with conflicting network sharing settings, permissions and so on.  The printing process is faster because it doesn’t involve sending data to another computer before getting it printed.  Printing from local printers can be done only from computers that are part of the network but not from tablets or smartphones.