Hello,
I am trying to find some information that describes the process gone through when a resource is requested on an NT network by a client that is not authenticated. For instance on a 9x machine that is not logged into a domain, but has a connection on a network, what happens when they request use of a file located on an NT machine. (Specifically ones running NT 4.0 server service pack 6a, or Windows 2000 server service pack 2.) I'm also interested in what happens with clients such as VPN users who are not authenticated before they access the network by virtue of how VPNs work. I have read the stuff I can find (but am always interested in more) on what happens when a user logs into a domain and how authentication proceeds at that time, but I'm interested in the other cases and haven't been able to find anything on it. Thanks in advance, Teresa ------ You are subscribed as [email protected] Archives: http://www.swynk.com/sitesearch/search.asp To unsubscribe send a blank email to [EMAIL PROTECTED]
