Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Sharing Files Between 2 PCs is as Easy as Dragging and Dropping

b2ap3_thumbnail_person_network_400.jpgWhat’s the best way to share files between your different personal devices and computers? It turns out that you can share files over your home’s network, and you don’t have to be an IT technician to do it.

To be sure, there are many different ways to share files between your different devices. You can send an email from one device to another. You can upload the file to a cloud data storage service. You can even use an external data storage device like a USB thumb drive. While all of these methods will do the trick, some are more inconvenient than others (like using a thumb drive), while others (like the first two examples) require an Internet connection and reliance on a third party.

Instead, you might be surprised to learn that you can just as easily (if not more easily) move files over your home network to your different devices by dragging and dropping what you need to a shared folder. This functions similarly to how your computer network at the office is set up with its server units and multiple workstations. However, you don’t need a home server unit to share files across your different devices at home. Instead, if you’ve got two computers connected via your home’s Internet router, then you’re all set to easily share files between the two machines.

Share Files Using My Network Places
To do this, open My Network Places, locate a file associated with the computer that you want to share files with (designated by the PC’s assigned name), and then drag and drop your content into the shared file. To access the shared content with the computer that you just shared it with, locate My Network Places on your other computer and open the file that corresponds with the actions you just took.

Or Create a Windows Homegroup
If for some reason you’re unable to share the files you need between your two computers using My Network Places, then you can set up a Windows Homegroup. To do this, type “homegroup” in the Windows search box and then hit Enter. From here, Windows will let you know if there are any homegroups on your network. If it can’t find one, click Create a homegroup.

Next, select what kind of content and devices that you want to share in this homegroup and then select Next.

homegroup ib 1

Windows will now generate a password that you will want to use for other computers to access the newly created homegroup. Be sure to record and share this in a secure manner if you’re adding multiple users to the homegroup.

Lastly, using the other computer on your home network, search for “homegroup” in the Windows search bar. This should bring up a dialogue box letting you know that a new homegroup has been added to your network. It will display the name of the computer you’ve originally used to create the homegroup. Now, just click Next > Enter the password > click Next again > and you’ll have both of your computers set up on the homegroup for easy file sharing.

If you need professional assistance with any of your computer networking needs, give Total Tech Care a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 November 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications IT Support Business Continuity Smartphones Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Windows Managed IT Services Upgrade Phishing Outsourced IT Data Backup Ransomware Windows 10 Cloud Computing Office Server Save Money Data Recovery Passwords Windows 10 Virtualization Tech Term Saving Money Holiday Chrome Gadgets Social Media Managed Service Managed IT Services Automation Microsoft Office Artificial Intelligence Cybercrime Computers Operating System Facebook Wi-Fi Health BYOD Mobile Device Management Networking IT Support Internet of Things Hacking Information Remote Spam Office 365 Covid-19 Telephone Systems Managed Service Provider Information Technology Alert Recovery Employer-Employee Relationship Bandwidth Router BDR Social Engineering Mobility Password Human Resources Mobile Computing Money Encryption Data Breach Application Remote Monitoring Applications App Law Enforcement History Big Data Managed IT Data Storage Patch Management Apps Remote Computing Mobile Office Government Office Tips How To Training Blockchain Private Cloud Paperless Office VPN Settings Bring Your Own Device Flexibility Data Management Marketing Work/Life Balance Infrastructure Voice over Internet Protocol Vulnerability Two-factor Authentication WiFi Windows 7 IT solutions Word Entertainment Website Budget Mouse HaaS Servers Google Drive Data Security Avoiding Downtime Wireless Gmail Connectivity Remote Work Firewall Cleaning Conferencing Virtual Reality Apple Scam End of Support Social Education Physical Security USB User Error Safety Vendor Data Protection Vendor Management Meetings Sports HIPAA Managed Services Redundancy Display Keyboard Risk Management Employee/Employer Relationship Hacker RMM The Internet of Things Lithium-ion battery Software as a Service Telephone System Staff Save Time Machine Learning Update Data storage Hiring/Firing Digital Signage Customer Service Environment Unified Threat Management Automobile Computer Accessories Google Docs Fax Server Identity Theft Computing Infrastructure Procurement Going Green Workplace Strategy SaaS Net Neutrality Business Intelligence Help Desk Printer Battery Audit Printing Worker Bluetooth Augmented Reality Network Congestion Shadow IT Fraud IT Management Legal eWaste Botnet Remote Worker Managed Services Provider Internet Exlporer IT Plan Cryptocurrency Database IT Consultant Unsupported Software PDF Remote Workers Wearable Technology Hard Drives Humor Comparison Charger Retail Processor Proactive IT Instant Messaging Compliance Robot Excel CES OneNote Computer Care Best Practice Current Events Hard Drive YouTube Biometrics Telephony Black Market Virtual Desktop Business Technology Content Management Access Control Samsung Computing DDoS Virtual Assistant Authentication Document Management Value SharePoint Wireless Technology Solid State Drive How to Spam Blocking Downtime Electronic Medical Records Virus Digital Signature Mobile Windows Media Player Dark mode Windows 10s Trend Micro User PowerPoint Warranty Cast SMS Colocation Default App Uninterrupted Power Supply webinar Saving Time Antivirus Emergency HVAC Google Apps Tip of the week Procedure Analysis Professional Services dark theme Public Cloud Shopping Monitor Employer Employee Relationship Google Search Managing Stress Windows 8 Administrator Devices AI Assessment IT Infrastructure IT service FinTech Bing Enterprise Content Management Cameras Windows Server 2008 Accountants Tools Social Network Reputation Streaming Media MSP Tablet Investment Domains Tech Support Microchip Thought Leadership Content Credit Cards Television Employees Techology Employee/Employer Relationships Laptop Password Management Password Manager Windows 365 Multi-Factor Security IaaS Customers ISP Maintenance Public Computer ROI Search Engine Bloatware Twitter Audiobook Video Conferencing Regulations Sales Bitcoin Touchpad Transportation Shortcuts NIST Printer Server Business Mangement Tablets Smart Tech Point of Sale Trending Computer Fan Personal Rootkit Cryptomining Entrepreneur Addiction Politics Amazon Supply Chain Management Advertising Monitoring Workers Batteries Benefits Recycling Practices Windows 8.1 FENG Digitize Shortcut Notifications Wiring IBM Windows Server 2008 R2 Cost Management Cache Amazon Web Services Flash Customer relationships Smart Technology Social Networking Safe Mode Criminal Hosted Computing Email Best Practices IT Assessment Relocation Manufacturing GDPR Supercomputer Wireless Internet Online Shopping Software Tips Sync Computer Tips Video Games Emails Managed IT Service Running Cable Security Cameras File Sharing Memory Inventory Virtual CIO Worker Commute Specifications OneDrive Biometric Security Camera Consultant Wire Experience Evernote Peripheral Digital Security Cameras Scalability Travel Netflix Using Data Two Factor Authentication Analytics Business Owner Millennials Root Cause Analysis Copiers 5G Printers Knowledge NarrowBand Music Best Available Smart Office Wireless Charging HBO Quick Tip Skype Ergonomics Search Smartwatch WIndows 7 Science Workforce Data loss Development iPhone OLED Virtual Private Network Leadership Virtual Machine Troubleshooting Cables Outlook PCI DSS Start Menu 2FA Fiber Optics Distributed Denial of Service Employee Customer Relationship Management Project Management Analyitcs Nanotechnology Telecommuting Screen Mirroring Messaging Files Loyalty Cabling Hypervisor Chromecast Books Programming Cortana Frequently Asked Questions Policy

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code