Description: * To protect our network from unauthorized users.
* Access permissions are allowed only to valid users.
* Resources can be shared between the client and the server.
* Server can take a backup copy of what the client request.
* Server also prepare a report of who all accessed , what was
accessed and day of access.
To Search:
File list (Check if you may need any files):
Resource Sharer With Backup\client1.c
...........................\server1.c
Resource Sharer With Backup