NT and Windows 95/98 Network Integration

NT and Windows 95/98 Network Integration

At our school we have a Windows NT Server network (10O Base T and 10 Base T mix) for our students to use. We have a five-station peer-to-peer Windows 95/98 network in our office. My question is: We would like to access the student network (NT) from the office, without letting students access our office network. Do we set up one of the office machines as a “router,” with two NICs so it particpates in both networks? If so, does this computer have to be NT? Server or workstation? Or, if the peer-to-peer machines are reconfigured to participate in the NT network (get validated at the PDC), can we expect enough security so that the students can’t access our office computers (that is, not even see them)?

If you are going to use the peer-to-peer capabilities of Win95, be sure to set the validation level on each machine to “User-level access control,” not the default “Share-level access control.” With this setting, you can deny access to individuals or, preferably, groups, to any resource on the Win95 machines. However, you will have to make sure each Win95 machine is set up correctly. An easier way might be to disable LM Authentication on the NT machines. (See the MSDN article “How To Disable LM Authentication on Windows NT.”) The effect of this is that an NT machine cannot be authenticated.

“Level 0: Send LM and Windows NT authentication (default).
Level 1: Send Windows NT authentication and LM authentication only if the server requests it.
Level 2: Never send LM authentication.

“If a Windows NT client selects level 2, it cannot connect to servers that support only LM authentication, such as Windows 95 and Windows for Workgroups.”

Share the Post:
XDR solutions

The Benefits of Using XDR Solutions

Cybercriminals constantly adapt their strategies, developing newer, more powerful, and intelligent ways to attack your network. Since security professionals must innovate as well, more conventional endpoint detection solutions have evolved

AI is revolutionizing fraud detection

How AI is Revolutionizing Fraud Detection

Artificial intelligence – commonly known as AI – means a form of technology with multiple uses. As a result, it has become extremely valuable to a number of businesses across

AI innovation

Companies Leading AI Innovation in 2023

Artificial intelligence (AI) has been transforming industries and revolutionizing business operations. AI’s potential to enhance efficiency and productivity has become crucial to many businesses. As we move into 2023, several

data fivetran pricing

Fivetran Pricing Explained

One of the biggest trends of the 21st century is the massive surge in analytics. Analytics is the process of utilizing data to drive future decision-making. With so much of

kubernetes logging

Kubernetes Logging: What You Need to Know

Kubernetes from Google is one of the most popular open-source and free container management solutions made to make managing and deploying applications easier. It has a solid architecture that makes

ransomware cyber attack

Why Is Ransomware Such a Major Threat?

One of the most significant cyber threats faced by modern organizations is a ransomware attack. Ransomware attacks have grown in both sophistication and frequency over the past few years, forcing

data dictionary

Tools You Need to Make a Data Dictionary

Data dictionaries are crucial for organizations of all sizes that deal with large amounts of data. they are centralized repositories of all the data in organizations, including metadata such as