Abstract
In the last chapter, we explored many of the features that New Technology File System (NTFS) provides to secure files and folders from a local environment. The most common (and easiest) type of unauthorized attack seeks to gain access directly to a computer on the network from within an office. With the knowledge and tips gained from the last chapter, your local files should be relatively safe. However, we will now explore the possibility that the intruder has managed to infiltrate your network, or has hacked through your firewall, perhaps via a stolen laptop, and now is searching your network for any vulnerabilities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Mike Halsey and Andrew Bettany
About this chapter
Cite this chapter
Halsey, M., Bettany, A. (2015). Managing File Sharing. In: Windows File System Troubleshooting. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-1016-1_4
Download citation
DOI: https://doi.org/10.1007/978-1-4842-1016-1_4
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-1017-8
Online ISBN: 978-1-4842-1016-1
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)