Using SafeHouse on Network Servers

SafeHouse volumes stored on network servers can be accessed from your PC. What's more, all the data which travels over the network cables is encrypted and safe from network sniffers.

Single Users

This single-user scenario is one whereby a lone person works with the volume.

SafeHouse really doesn't care where your volume is located. It can open volumes hosted on nearly any kind of media or network server.

You can either create your volume directly on the network server, or create it on your local hard drive and copy it over later using Explorer.

You can then open the volume and access its files as you would any other SafeHouse volume. As long as you have the appropriate network access permissions, SafeHouse will never know the difference and will behave just as if the volume file were hosted locally.

Multiple Users

This scenario is one whereby more than one user requires access to the data contained inside a SafeHouse volume at the same time.

Normally, SafeHouse places an exclusive file lock on a open volumes to ensure its integrity. This is important because of the way Windows performs file system caching.

SafeHouse may not, under any circumstances, allow two people to have write access to a volume at the same time.

To have a volume be simultaneously accessible to more than one network user, all users must open the volume for read-only access. SafeHouse provides a number of ways to accomplish this; but the easiest way is to create a desktop shortcut to open the network-hosted volume, and then add /READONLY to the command line.

Once a volume is opened in read-only mode by any network user, no other user will be allowed to open the volume for writing.

If you need multiple users to be reading and writing to files inside a volume at the same time, then you're going to need a solution that is beyond what SafeHouse offers.

Using Master and Shadow Volumes

One technique that is often-used to get around some of the aforementioned restrictions is to create one master volume which receives regular updates (but only from one person at a time), and then making one or more shadow copies of that volume on some regular schedule which are then accessed by everyone else in read-only mode.

The advantage of this method is that potentially hundreds of people could be accessing the shadow copies at any one time.

This approach might not be appropriate for fast-changing data, but it's been implemented very successfully many times for slow-changing data such as digital maps and historical data used for business analysis.

encrypt file  software security  software security