Skip to main content

Net Use Command (Windows)

There are many ways to map yourself or someone a network drive, but today I will show you how to map a network drive in the command prompt. 


syntax:
net view -- views all computers in the workgroup or domain network
-----------------------------------------------------------------------------------------------------

syntax:
net view \\computername -- views any share folders on the computer 
 
example:
net view \\DTS-Enterprise

-----------------------------------------------------------------------------------------------------

syntax:

net use [drive letter] \\computername -- add a network share
example:
net use M: "\\DTS-Enterprise\Control Center"
Note: if there is a space between on the folder you need to put quotes on before and after like in the example. You can use any letter drive as long as it is not being used.
-----------------------------------------------------------------------------------------------------

syntax:

net use [drive letter] \DELETE-- deletes the network network share
example:
net use M: \DELETE

Comments

Popular posts from this blog

Netwars Competition

The NetWars game is a collection of computer and network security challenges. It is designed to represent real-world security issues: their flaws and their resolutions. Each player can follow an independent path based on individual problem solving skills, technical skills, aptitude, and creativity. The game is played in a fun but safe environment using the technology that drives our lives every day. The game starts when a player downloads and starts a CD-ROM image on a PC or in a virtual environment such as VMware Player. The image contains a brief tutorial and the game's full instructions. The player must find a hidden key within the image that is downloaded and then uses that key to enter an online environment where knowledge of security vulnerabilities and their exploits can be turned into points. Upcoming Competitions   June 18-20, 2010 PST September 17-19, 2010 November 5-7, 2010 December 17-19, 2010 April 29 - May 1, 2011 Click Here to read more

Protecting the Kernel

Standard Linux Kernel When installing Linux it comes with the default Linux kernel compiled which is okay for most user, but when it comes to protect your data it is also good idea to build your own secure configuration. To get latest state or beta version of the kernel go to http://www.kernel.org/ Note: if you’re still unsure or feel uneasy if you want to do this then this is not for you. To get full details on compiling Linux Kernel you can visit: http://www.digitalhermit.com/linux/Kernel-Build-HOWTO.html#CONFIGURATION-INTRO http://www.faqs.org/docs/Linux-HOWTO/Kernel-HOWTO.html For security reason the DTS server kernel configuration can not be shown.

New PDF Tutorials

I made some new tutorial enjoy! The Linux Permission PDF is how you can control your user see what files or folders. File Name: Linux Permissions.pdf File Size: 847KB Date Created: 03/25/2010 Download Now The Recover Your Data PDF is how you can recover your files in cases your windows operating system isn't booting up or your windows OS has spyware or virus.. This is the first half of recoverying your data. The second part will show you how to recover a deleted file, but that would be explain in the next PDF File Name: Recover Your Data.pdf File Size: 1540KB Date Created: 03/25/2010 Download Now   Hosted by Microsoft Office Live