RE: non-local admin revisited

2011-07-20 Thread Paul Hutchings
Yeah, I wasn't too clear from David's post though if it hat was the intention 
or if it was to try and stop people throwing on whatever they want.

I'd either go with UAC or have a local account on each machine and use it for 
Run As when needed - I've not played too much with restricted groups but 
AFAIK it overwrites the local admins group rather than appending it which I'd 
find a little (pardon the pun) restrictive.

Paul

From: Andrew S. Baker [mailto:asbz...@gmail.com]
Sent: 20 July 2011 01:08
To: NT System Admin Issues
Subject: Re: non-local admin revisited

Reduce risks related to system infection...
ASB

http://about.me/Andrew.S.Baker

Harnessing the Advantages of Technology for the SMB market...



On Tue, Jul 19, 2011 at 4:15 PM, Paul Hutchings 
paul.hutchi...@mira.co.ukmailto:paul.hutchi...@mira.co.uk wrote:
What's your reason for wanting to do it?

From: David Lum [david@nwea.orgmailto:david@nwea.org]
Sent: 19 July 2011 6:10 PM

To: NT System Admin Issues
Subject: non-local admin revisited
How do you bigger org's handle IT staff (DBA's and the like) not being local 
admins on their systems? Invariably they are used to throwing on whatever they 
want and in some ways this helps the Help desk so they're not called to install 
stuff the user can install.

As we move to Windows 7 my recommendation is to yank local admin perms at the 
same time (yes everyone is local admin on their XP systems currently), but I 
foresee pushback from Service Desk and IT folks...
David Lum
Systems Engineer // NWEATM
Office 503.548.5229tel:503.548.5229 // Cell (voice/text) 
503.267.9764tel:503.267.9764


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

--
MIRA Ltd

Watling Street, Nuneaton, Warwickshire, CV10 0TU, England
Registered in England and Wales No. 402570
VAT Registration  GB 100 1464 84

The contents of this e-mail are confidential and are solely for the use of the 
intended recipient.  If you receive this e-mail in error, please delete it and 
notify us either by e-mail, telephone or fax.  You should not copy, forward or 
otherwise disclose the content of the e-mail as this is prohibited.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: non-local admin revisited

2011-07-20 Thread James Rankin
I run with a non-privileged account on my Win7 workstation and have an admin
account that I supply to UAC whenever I need to run anything with
higher-level privileges.

This works great for me, I am happy that I can't be tricked into anything
without seeing the prompt. It's a *little *annoying when I have to launch a
Citrix Delivery Services Console, a custom MMC and a PowerShell window with
Run as administrator every time I log in, but that's the trade-off for
higher security.

I also like the way Restricted Groups GPOs blat the whole group down rather
than appending and we use this in addition to dual accounts and UAC. It
certainly ensures the only people with local admin access to our
workstations or servers are the accounts that we have deigned shall have it.

On 20 July 2011 10:19, Paul Hutchings paul.hutchi...@mira.co.uk wrote:

  Yeah, I wasn’t too clear from David’s post though if it hat was the
 intention or if it was to try and stop people throwing on whatever they
 want.

 ** **

 I’d either go with UAC or have a local account on each machine and use it
 for “Run As” when needed – I’ve not played too much with restricted groups
 but AFAIK it overwrites the local admins group rather than appending it
 which I’d find a little (pardon the pun) restrictive.

 ** **

 Paul

 

 *From:* Andrew S. Baker [mailto:asbz...@gmail.com]
 *Sent:* 20 July 2011 01:08

 *To:* NT System Admin Issues
 *Subject:* Re: non-local admin revisited

 ** **

 Reduce risks related to system infection...
 

 *ASB*

 *http://about.me/Andrew.S.Baker*

 *Harnessing the Advantages of Technology for the SMB market…*



 

 On Tue, Jul 19, 2011 at 4:15 PM, Paul Hutchings paul.hutchi...@mira.co.uk
 wrote:

 What's your reason for wanting to do it? 
   --

 *From:* David Lum [david@nwea.org]
 *Sent:* 19 July 2011 6:10 PM


 *To:* NT System Admin Issues

 *Subject:* non-local admin revisited

 How do you bigger org’s handle IT staff (DBA’s and the like) not being
 local admins on their systems? Invariably they are used to throwing on
 whatever they want and in some ways this helps the Help desk so they’re not
 called to install stuff the user can install.

  

 As we move to Windows 7 my recommendation is to yank local admin perms at
 the same time (yes everyone is local admin on their XP systems currently),
 but I foresee pushback from Service Desk and IT folks…

 *David Lum*
 Systems Engineer // NWEATM
 Office 503.548.5229 //* *Cell (voice/text) 503.267.9764

 ** **

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~

 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin

  --
 *MIRA Ltd*

 Watling Street, Nuneaton, Warwickshire, CV10 0TU, England
 Registered in England and Wales No. 402570
 VAT Registration  GB 100 1464 84

 The contents of this e-mail are confidential and are solely for the use of
 the intended recipient.  If you receive this e-mail in error, please delete
 it and notify us either by e-mail, telephone or fax.  You should not copy,
 forward or otherwise disclose the content of the e-mail as this is
 prohibited.

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~

 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin




-- 
On two occasions...I have been asked, 'Pray, Mr Babbage, if you put into
the machine wrong figures, will the right answers come out?' I am not able
rightly to apprehend the kind of confusion of ideas that could provoke such
a question.

** IMPORTANT INFORMATION/DISCLAIMER *

This document should be read only by those persons to whom it is addressed.
If you have received this message it was obviously addressed to you and
therefore you can read it, even it we didn't mean to send it to you.
However, if the contents of this email make no sense whatsoever then you
probably were not the intended recipient, or, alternatively, you are a
mindless cretin; either way, you should immediately kill yourself and
destroy your computer (not necessarily in that order). Once you have taken
this action, please contact us.. no, sorry, you can't use your computer,
because you just destroyed it, and possibly also committed suicide
afterwards, but I am starting to digress.. *

* The originator of this email is not liable for the transmission of the
information contained in this communication. Or are they? Either way it's a
pretty dull legal query and frankly one I'm not going to dwell on. But
should you have nothing better to do, please feel 

Re: Security IT to employee ratio

2011-07-20 Thread Andrew S. Baker
You will be hard pressed to find such a document, given all the variables,
nor is that a useful way to go about justifying the headcount that might be
needed.

Rather, put together a list of all the activities that are needed to
successfully maintain the security posture in your specific environment.
 Allocate some estimation of the time needed for each function, then add it
all up.  (Also take the liberty of delegating some portions of it to other
technology departments, as necessary).

This will tell you what the level of staffing *should* be for your
environment, and by adding work to other people's plates, you'll
automatically get their support for additional headcount.  :)

Of course, expect management to disagree on some of the items in your list,
AND in the time allocated -- especially if they can keep it the way it is by
shaving a few numbers and whacking a few tasks.

* *

*ASB* *http://about.me/Andrew.S.Baker* *Harnessing the Advantages of
Technology for the SMB market…

*



On Wed, Jul 20, 2011 at 1:05 AM, David Lum david@nwea.org wrote:

  Is there a document anywhere that can give me an idea of something along
 the lines of a general recommended active IT security staff per employee
 ratio? By active IT security I mean in-the-trenches people doing the
 legwork to get the last 3-5% of systems (at 400+ systems nothing is ever
 100% in perfectly automated sync) fully compliant and up-to-date, keep
 astride of the IDS detections and tracking down which are false positives
 and which are actual alerts, etc.

 It has occurred to me that with 450 employees that there should probably be
 more than one FTE handling everything from IDS to keeping patches and AV
 current on all systems, employee training, etc…

 Heck I bet I can use one FTE that does NOTHING but track down and mitigate
 the non-compliant systems for AV and patching alone.

 *David Lum*
 Systems Engineer // NWEATM
 Office 503.548.5229 //* *Mobile 503.267.9764





~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: non-local admin revisited

2011-07-20 Thread Andrew S. Baker
Either way is easily faciliated depending upon one's requirements.

* *

*ASB* *http://about.me/Andrew.S.Baker* *Harnessing the Advantages of
Technology for the SMB market…

*



On Wed, Jul 20, 2011 at 12:07 AM, Ben Scott mailvor...@gmail.com wrote:

 On Tue, Jul 19, 2011 at 9:36 PM, Kennedy, Jim
 kennedy...@elyriaschools.org wrote:
  Hmmm, I like this. With UAC on there is validity to running as
  an admin all the time, IF you only have admin on your own
  machine.

   I'd still much rather be required to enter a password for privileged
 operations.  Being one click away from system privilege is scary for a
 number of reasons.

 -- Ben



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Windows 2008 Server Recovery

2011-07-20 Thread Tom Miller
Looks like a recent patch or whatever corrupted the NOS on one of my Windows 
2008 R2 servers.  What's the tool du jour?  I use the Windows 2008 ISO, select 
language, see my installed copy of Windows, but then it wants me to select an 
image, or drop to command prompt.  
 
I can rebuild it fine, but it is a XenApp server with several customized apps, 
annoying to recreate.  I'd rather not bother with restore from de-dup system.
 
Suggestions?
 
Fault is 0xc00f - corrupt file somewhere.
 
Thanks,
Tom

Confidentiality Notice:  This e-mail message, including attachments, is for the 
sole use of the intended recipient(s) and may contain confidential and 
privileged information.  Any unauthorized review, use, disclosure, or 
distribution is prohibited.  If you are not the intended recipient, please 
contact the sender by reply e-mail and destroy all copies of the original 
message.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: Security IT to employee ratio

2011-07-20 Thread David Lum
Thanks ASB, that's kind of what I was afraid of and as always you suggest good 
steps.

Dave

From: Andrew S. Baker [mailto:asbz...@gmail.com]
Sent: Wednesday, July 20, 2011 4:00 AM
To: NT System Admin Issues
Subject: Re: Security IT to employee ratio

You will be hard pressed to find such a document, given all the variables, nor 
is that a useful way to go about justifying the headcount that might be needed.

Rather, put together a list of all the activities that are needed to 
successfully maintain the security posture in your specific environment.
Allocate some estimation of the time needed for each function, then add it all 
up.  (Also take the liberty of delegating some portions of it to other 
technology departments, as necessary).

This will tell you what the level of staffing *should* be for your environment, 
and by adding work to other people's plates, you'll automatically get their 
support for additional headcount.  :)

Of course, expect management to disagree on some of the items in your list, AND 
in the time allocated -- especially if they can keep it the way it is by 
shaving a few numbers and whacking a few tasks.

ASB

http://about.me/Andrew.S.Baker

Harnessing the Advantages of Technology for the SMB market...



On Wed, Jul 20, 2011 at 1:05 AM, David Lum 
david@nwea.orgmailto:david@nwea.org wrote:
Is there a document anywhere that can give me an idea of something along the 
lines of a general recommended active IT security staff per employee ratio? 
By active IT security I mean in-the-trenches people doing the legwork to get 
the last 3-5% of systems (at 400+ systems nothing is ever 100% in perfectly 
automated sync) fully compliant and up-to-date, keep astride of the IDS 
detections and tracking down which are false positives and which are actual 
alerts, etc.

It has occurred to me that with 450 employees that there should probably be 
more than one FTE handling everything from IDS to keeping patches and AV 
current on all systems, employee training, etc...

Heck I bet I can use one FTE that does NOTHING but track down and mitigate the 
non-compliant systems for AV and patching alone.

David Lum
Systems Engineer // NWEATM
Office 503.548.5229tel:503.548.5229 // Mobile 503.267.9764tel:503.267.9764




~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: non-local admin revisited

2011-07-20 Thread David Lum
1.   Facilitates such minutiae as being able to maintain a more accurate 
software inventory which plays directly to software licensing compliance.

2.   Prevents (or at least hinders) a user from making (read: inadvertently 
allowing) system-wide changes to their machine that creates problems difficult 
for Service Desk to repair.

3.   Prevents  them (or at least makes it more inconvenient, which is 
sometimes the same thing) from loading unauthorized applications.

Dave

From: Paul Hutchings [mailto:paul.hutchi...@mira.co.uk]
Sent: Tuesday, July 19, 2011 1:15 PM
To: NT System Admin Issues
Subject: RE: non-local admin revisited

What's your reason for wanting to do it?

From: David Lum [david@nwea.org]
Sent: 19 July 2011 6:10 PM
To: NT System Admin Issues
Subject: non-local admin revisited
How do you bigger org's handle IT staff (DBA's and the like) not being local 
admins on their systems? Invariably they are used to throwing on whatever they 
want and in some ways this helps the Help desk so they're not called to install 
stuff the user can install.

As we move to Windows 7 my recommendation is to yank local admin perms at the 
same time (yes everyone is local admin on their XP systems currently), but I 
foresee pushback from Service Desk and IT folks...
David Lum
Systems Engineer // NWEATM
Office 503.548.5229 // Cell (voice/text) 503.267.9764


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


MIRA Ltd

Watling Street, Nuneaton, Warwickshire, CV10 0TU, England
Registered in England and Wales No. 402570
VAT Registration  GB 100 1464 84

The contents of this e-mail are confidential and are solely for the use of the 
intended recipient.  If you receive this e-mail in error, please delete it and 
notify us either by e-mail, telephone or fax.  You should not copy, forward or 
otherwise disclose the content of the e-mail as this is prohibited.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: Windows 2008 Server Recovery

2011-07-20 Thread Michael B. Smith
As long as your image matches the windows service pack, then choose an upgrade, 
instead of a repair.
If you image doesn't match the windows service pack, then get one that does.
Regards,

Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com

From: Tom Miller [mailto:tmil...@hnncsb.org]
Sent: Wednesday, July 20, 2011 8:55 AM
To: NT System Admin Issues
Subject: Windows 2008 Server Recovery

Looks like a recent patch or whatever corrupted the NOS on one of my Windows 
2008 R2 servers.  What's the tool du jour?  I use the Windows 2008 ISO, select 
language, see my installed copy of Windows, but then it wants me to select an 
image, or drop to command prompt.

I can rebuild it fine, but it is a XenApp server with several customized apps, 
annoying to recreate.  I'd rather not bother with restore from de-dup system.

Suggestions?

Fault is 0xc00f - corrupt file somewhere.

Thanks,
Tom


Confidentiality Notice: This e-mail message, including attachments, is for the 
sole use of the intended recipient(s) and may contain confidential and 
privileged information. Any unauthorized review, use, disclosure, or 
distribution is prohibited. If you are not the intended recipient, please 
contact the sender by reply e-mail and destroy all copies of the original 
message.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: Security IT to employee ratio

2011-07-20 Thread Ken Schaefer
I would also start to look at what the business requirements are.

One FTE is going to cover 40 hours out of a 168 hour week (assuming no leave). 
Does someone need to monitor things (like your IDS/IPS) during non-business 
hours?

In a much larger org, we have dedicated teams for AV, desktop patching, network 
patching, server patching (Windows and *nix), event monitoring/correlation, 
incident response and so on. This is all driven by either (a) SLAs/OLAs and (b) 
patching cycles. We work from those requirements to work out how many people we 
need, based on how quickly we need to turn things around.

Cheers
Ken

From: David Lum [mailto:david@nwea.org]
Sent: Wednesday, 20 July 2011 9:04 PM
To: NT System Admin Issues
Subject: RE: Security IT to employee ratio

Thanks ASB, that's kind of what I was afraid of and as always you suggest good 
steps.

Dave

From: Andrew S. Baker [mailto:asbz...@gmail.com]
Sent: Wednesday, July 20, 2011 4:00 AM
To: NT System Admin Issues
Subject: Re: Security IT to employee ratio

You will be hard pressed to find such a document, given all the variables, nor 
is that a useful way to go about justifying the headcount that might be needed.

Rather, put together a list of all the activities that are needed to 
successfully maintain the security posture in your specific environment.
Allocate some estimation of the time needed for each function, then add it all 
up.  (Also take the liberty of delegating some portions of it to other 
technology departments, as necessary).

This will tell you what the level of staffing *should* be for your environment, 
and by adding work to other people's plates, you'll automatically get their 
support for additional headcount.  :)

Of course, expect management to disagree on some of the items in your list, AND 
in the time allocated -- especially if they can keep it the way it is by 
shaving a few numbers and whacking a few tasks.

ASB

http://about.me/Andrew.S.Baker

Harnessing the Advantages of Technology for the SMB market...


On Wed, Jul 20, 2011 at 1:05 AM, David Lum 
david@nwea.orgmailto:david@nwea.org wrote:
Is there a document anywhere that can give me an idea of something along the 
lines of a general recommended active IT security staff per employee ratio? 
By active IT security I mean in-the-trenches people doing the legwork to get 
the last 3-5% of systems (at 400+ systems nothing is ever 100% in perfectly 
automated sync) fully compliant and up-to-date, keep astride of the IDS 
detections and tracking down which are false positives and which are actual 
alerts, etc.

It has occurred to me that with 450 employees that there should probably be 
more than one FTE handling everything from IDS to keeping patches and AV 
current on all systems, employee training, etc...

Heck I bet I can use one FTE that does NOTHING but track down and mitigate the 
non-compliant systems for AV and patching alone.

David Lum
Systems Engineer // NWEATM
Office 503.548.5229tel:503.548.5229 // Mobile 503.267.9764tel:503.267.9764



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: Windows 2008 Server Recovery

2011-07-20 Thread Tom Miller
K, I'll give that a try.  Thanks.

 Michael B. Smith mich...@smithcons.com 7/20/2011 9:12 AM 

As long as your image matches the windows service pack, then choose an
upgrade, instead of a repair.
If you image doesn’t match the windows service pack, then get one that
does.

Regards,
 
Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com

 

From: Tom Miller [mailto:tmil...@hnncsb.org] 
Sent: Wednesday, July 20, 2011 8:55 AM
To: NT System Admin Issues
Subject: Windows 2008 Server Recovery

 

Looks like a recent patch or whatever corrupted the NOS on one of my
Windows 2008 R2 servers.  What's the tool du jour?  I use the Windows
2008 ISO, select language, see my installed copy of Windows, but then it
wants me to select an image, or drop to command prompt.  

 

I can rebuild it fine, but it is a XenApp server with several
customized apps, annoying to recreate.  I'd rather not bother with
restore from de-dup system.

 

Suggestions?

 

Fault is 0xc00f - corrupt file somewhere.

 

Thanks,

Tom

 
Confidentiality Notice: This e-mail message, including attachments, is
for the sole use of the intended recipient(s) and may contain
confidential and privileged information. Any unauthorized review, use,
disclosure, or distribution is prohibited. If you are not the intended
recipient, please contact the sender by reply e-mail and destroy all
copies of the original message. 
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin
Confidentiality Notice:  This e-mail message, including attachments, is
for the sole use of the intended recipient(s) and may contain
confidential and privileged information.  Any unauthorized review, use,
disclosure, or distribution is prohibited.  If you are not the intended
recipient, please contact the sender by reply e-mail and destroy all
copies of the original message.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: Security IT to employee ratio

2011-07-20 Thread Ziots, Edward
I have to agree on Ken's Comments, again the business requirements are
going to dictate in this case, there won't be any quick and dirty
numbers. 

 

Z

 

Edward E. Ziots

CISSP, Network +, Security +

Security Engineer

Lifespan Organization

Email:ezi...@lifespan.org

Cell:401-639-3505

 

 

From: Ken Schaefer [mailto:k...@adopenstatic.com] 
Sent: Wednesday, July 20, 2011 9:19 AM
To: NT System Admin Issues
Subject: RE: Security IT to employee ratio

 

I would also start to look at what the business requirements are.

 

One FTE is going to cover 40 hours out of a 168 hour week (assuming no
leave). Does someone need to monitor things (like your IDS/IPS) during
non-business hours?

 

In a much larger org, we have dedicated teams for AV, desktop patching,
network patching, server patching (Windows and *nix), event
monitoring/correlation, incident response and so on. This is all driven
by either (a) SLAs/OLAs and (b) patching cycles. We work from those
requirements to work out how many people we need, based on how quickly
we need to turn things around.

 

Cheers
Ken

 

From: David Lum [mailto:david@nwea.org] 
Sent: Wednesday, 20 July 2011 9:04 PM
To: NT System Admin Issues
Subject: RE: Security IT to employee ratio

 

Thanks ASB, that's kind of what I was afraid of and as always you
suggest good steps.

 

Dave

 

From: Andrew S. Baker [mailto:asbz...@gmail.com] 
Sent: Wednesday, July 20, 2011 4:00 AM
To: NT System Admin Issues
Subject: Re: Security IT to employee ratio

 

You will be hard pressed to find such a document, given all the
variables, nor is that a useful way to go about justifying the headcount
that might be needed.

Rather, put together a list of all the activities that are needed to
successfully maintain the security posture in your specific environment.
Allocate some estimation of the time needed for each function, then add
it all up.  (Also take the liberty of delegating some portions of it to
other technology departments, as necessary).

This will tell you what the level of staffing *should* be for your
environment, and by adding work to other people's plates, you'll
automatically get their support for additional headcount.  :)

Of course, expect management to disagree on some of the items in your
list, AND in the time allocated -- especially if they can keep it the
way it is by shaving a few numbers and whacking a few tasks.


 

ASB

http://about.me/Andrew.S.Baker

Harnessing the Advantages of Technology for the SMB market...

 

On Wed, Jul 20, 2011 at 1:05 AM, David Lum david@nwea.org wrote:

Is there a document anywhere that can give me an idea of something along
the lines of a general recommended active IT security staff per
employee ratio? By active IT security I mean in-the-trenches people
doing the legwork to get the last 3-5% of systems (at 400+ systems
nothing is ever 100% in perfectly automated sync) fully compliant and
up-to-date, keep astride of the IDS detections and tracking down which
are false positives and which are actual alerts, etc.

 

It has occurred to me that with 450 employees that there should probably
be more than one FTE handling everything from IDS to keeping patches and
AV current on all systems, employee training, etc...

 

Heck I bet I can use one FTE that does NOTHING but track down and
mitigate the non-compliant systems for AV and patching alone.

 

David Lum 
Systems Engineer // NWEATM
Office 503.548.5229 // Mobile 503.267.9764

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadminimage001.jpg

RE: Thought on malware cleaning

2011-07-20 Thread Ziots, Edward
Humm I sense POSTAL Epic Fail… 

 

Don’t go off the deep end Epsi, you can’t stop everything, and you can’t stop 
the users from going to bad sites or getting owned in some cases. We all know 
that technical controls don’t solve personal behavior issues. 

 

Z

 

Edward E. Ziots

CISSP, Network +, Security +

Security Engineer

Lifespan Organization

Email:ezi...@lifespan.org

Cell:401-639-3505

 

From: MMF [mailto:mmfree...@ameritech.net] 
Sent: Tuesday, July 19, 2011 5:48 PM
To: NT System Admin Issues
Subject: Re: Thought on malware cleaning

 

Don’t hold back  ( 

 

MMF

 

From: Micheal Espinola Jr mailto:michealespin...@gmail.com  

Sent: Tuesday, July 19, 2011 3:15 PM

To: NT System Admin Issues mailto:ntsysadmin@lyris.sunbelt-software.com  

Subject: Re: Thought on malware cleaning

 

On that note, I'm going to go on my lunch break now.  Here's what I'll do:

I'm going to close my eyes and walk in the direction of my car.  Screw anything 
I walk into, because logically there should be doors that automatically open in 
the direction I need to go.  Screw how things currently exist, because I think 
I know how they should exist for me.  Because I know better.  Better than 
anyone else.  All must bend to my will.  And whatever people do now, they will 
change on the drop of a dime at my request.  Because user [re]education is akin 
to waving a magic wand.  What I say goes.  The world will fall in-line.

If I bang my face into a wall along the way - screw it.  I'll just keep doing 
it until someone comes along and changes something to be how I want it.  Sounds 
perfectly reasonable...

--
Espi

 

 





On Tue, Jul 19, 2011 at 1:01 PM, Micheal Espinola Jr 
michealespin...@gmail.com wrote:

Well that's f'ing helpful.  Good luck on educating the planet with a more 
logical course of action.  Let us know how that works-out for you!

--
Espi

 

 





On Tue, Jul 19, 2011 at 12:44 PM, Ben Scott mailvor...@gmail.com wrote:

On Tue, Jul 19, 2011 at 3:02 PM, Micheal Espinola Jr
michealespin...@gmail.com wrote:
 While I agree with your sentiment whole-heartedly, I still wonder why
 antimalware software isnt performing the most basic of checks for 
common
 infection breadcrumbs.

Hammer myopia.

(When all you have is a hammer, everything starts to look like a 
nail.)

-- Ben


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin
image003.pngimage004.jpg

RE: non-local admin revisited

2011-07-20 Thread Jim Dandy
My users aren't smart enough to use UAC properly.  They'll click on
anything if they think that is what they need to do to get to whatever
they want to do.  No matter how much you warn them, a dimmed UAC screen
isn't going to inhibit their impulses.

 -Original Message-
 From: Kennedy, Jim [mailto:kennedy...@elyriaschools.org]
 Sent: Tuesday, July 19, 2011 6:37 PM
 To: NT System Admin Issues
 Subject: RE: non-local admin revisited
 
 
 Hmmm, I like this. With UAC on there is validity to running as an
admin all the
 time, IF you only have admin on your own machine. Less hassle for them
 with minimal risk. Very cool twist Andrew.
 
 
 
 From: Andrew S. Baker [asbz...@gmail.com]
 Sent: Tuesday, July 19, 2011 8:11 PM
 To: NT System Admin Issues
 Subject: Re: non-local admin revisited
 
 
 IT members have Win7 and have local admin access of their own
machines,
 but with UAC enabled at the default level.
 
 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
 http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~
 
 ---
 To manage subscriptions click here: http://lyris.sunbelt-
 software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



file searching and copying

2011-07-20 Thread Jeff Bunting
I'm attempting to search for particular words in a directory name (must use
wildcards!), and, if found, copy the the directory tree while maintaining
its structure to another directory.

Are there any native tools (or reskit like robocopy) that can accomplish
this somewhat easily?

thanks,
Jeff

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: non-local admin revisited

2011-07-20 Thread James Rankin
It is if they have to type some credentials in. If they have admin accounts
and will type their password in after clicking on anything, then they
clearly need to have their admin accounts removed.

On 20 July 2011 16:59, Jim Dandy jda...@asmail.ucdavis.edu wrote:

 My users aren't smart enough to use UAC properly.  They'll click on
 anything if they think that is what they need to do to get to whatever
 they want to do.  No matter how much you warn them, a dimmed UAC screen
 isn't going to inhibit their impulses.

  -Original Message-
  From: Kennedy, Jim [mailto:kennedy...@elyriaschools.org]
  Sent: Tuesday, July 19, 2011 6:37 PM
  To: NT System Admin Issues
  Subject: RE: non-local admin revisited
 
 
  Hmmm, I like this. With UAC on there is validity to running as an
 admin all the
  time, IF you only have admin on your own machine. Less hassle for them
  with minimal risk. Very cool twist Andrew.
 
 
  
  From: Andrew S. Baker [asbz...@gmail.com]
  Sent: Tuesday, July 19, 2011 8:11 PM
  To: NT System Admin Issues
  Subject: Re: non-local admin revisited
 
 
  IT members have Win7 and have local admin access of their own
 machines,
  but with UAC enabled at the default level.
 
  ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
  http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~
 
  ---
  To manage subscriptions click here: http://lyris.sunbelt-
  software.com/read/my_forums/
  or send an email to listmana...@lyris.sunbeltsoftware.com
  with the body: unsubscribe ntsysadmin


 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin




-- 
On two occasions...I have been asked, 'Pray, Mr Babbage, if you put into
the machine wrong figures, will the right answers come out?' I am not able
rightly to apprehend the kind of confusion of ideas that could provoke such
a question.

** IMPORTANT INFORMATION/DISCLAIMER *

This document should be read only by those persons to whom it is addressed.
If you have received this message it was obviously addressed to you and
therefore you can read it, even it we didn't mean to send it to you.
However, if the contents of this email make no sense whatsoever then you
probably were not the intended recipient, or, alternatively, you are a
mindless cretin; either way, you should immediately kill yourself and
destroy your computer (not necessarily in that order). Once you have taken
this action, please contact us.. no, sorry, you can't use your computer,
because you just destroyed it, and possibly also committed suicide
afterwards, but I am starting to digress.. *

* The originator of this email is not liable for the transmission of the
information contained in this communication. Or are they? Either way it's a
pretty dull legal query and frankly one I'm not going to dwell on. But
should you have nothing better to do, please feel free to ruminate on it,
and please pass on any concrete conclusions should you find them. However,
if you pass them on via email, be sure to include a disclaimer regarding
liability for transmission.
*

* In the event that the originator did not send this email to you, then
please return it to us and attach a scanned-in picture of your mother's
brother's wife wearing nothing but a kangaroo suit, and we will immediately
refund you exactly half of what you paid for the can of Whiskas you bought
when you went to Pets** ** At Home yesterday. *

* We take no responsibility for non-receipt of this email because we are
running Exchange 5.5 and everyone knows how glitchy that can be. In the
event that you do get this message then please note that we take no
responsibility for that either. Nor will we accept any liability, tacit or
implied, for any damage you may or may not incur as a result of receiving,
or not, as the case may be, from time to time, notwithstanding all
liabilities implied or otherwise, ummm, hell, where was I...umm, no matter
what happens, it is NOT, and NEVER WILL BE, OUR FAULT! *

* The comments and opinions expressed herein are my own and NOT those of my
employer, who, if he knew I was sending emails and surfing the seamier side
of the Internet, would cut off my manhood and feed it to me for afternoon
tea. *

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: non-local admin revisited

2011-07-20 Thread Jonathan Link
Come now, you're familiar with people, aren't you?

On Wed, Jul 20, 2011 at 12:02 PM, James Rankin kz2...@googlemail.comwrote:

 It is if they have to type some credentials in. If they have admin accounts
 and will type their password in after clicking on anything, then they
 clearly need to have their admin accounts removed.


 On 20 July 2011 16:59, Jim Dandy jda...@asmail.ucdavis.edu wrote:

 My users aren't smart enough to use UAC properly.  They'll click on
 anything if they think that is what they need to do to get to whatever
 they want to do.  No matter how much you warn them, a dimmed UAC screen
 isn't going to inhibit their impulses.

  -Original Message-
  From: Kennedy, Jim [mailto:kennedy...@elyriaschools.org]
  Sent: Tuesday, July 19, 2011 6:37 PM
  To: NT System Admin Issues
  Subject: RE: non-local admin revisited
 
 
  Hmmm, I like this. With UAC on there is validity to running as an
 admin all the
  time, IF you only have admin on your own machine. Less hassle for them
  with minimal risk. Very cool twist Andrew.
 
 
  
  From: Andrew S. Baker [asbz...@gmail.com]
  Sent: Tuesday, July 19, 2011 8:11 PM
  To: NT System Admin Issues
  Subject: Re: non-local admin revisited
 
 
  IT members have Win7 and have local admin access of their own
 machines,
  but with UAC enabled at the default level.
 
  ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
  http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~
 
  ---
  To manage subscriptions click here: http://lyris.sunbelt-
  software.com/read/my_forums/
  or send an email to listmana...@lyris.sunbeltsoftware.com
  with the body: unsubscribe ntsysadmin


 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin




 --
 On two occasions...I have been asked, 'Pray, Mr Babbage, if you put into
 the machine wrong figures, will the right answers come out?' I am not able
 rightly to apprehend the kind of confusion of ideas that could provoke such
 a question.

 ** IMPORTANT INFORMATION/DISCLAIMER *

 This document should be read only by those persons to whom it is addressed.
 If you have received this message it was obviously addressed to you and
 therefore you can read it, even it we didn't mean to send it to you.
 However, if the contents of this email make no sense whatsoever then you
 probably were not the intended recipient, or, alternatively, you are a
 mindless cretin; either way, you should immediately kill yourself and
 destroy your computer (not necessarily in that order). Once you have taken
 this action, please contact us.. no, sorry, you can't use your computer,
 because you just destroyed it, and possibly also committed suicide
 afterwards, but I am starting to digress.. *

 * The originator of this email is not liable for the transmission of the
 information contained in this communication. Or are they? Either way it's a
 pretty dull legal query and frankly one I'm not going to dwell on. But
 should you have nothing better to do, please feel free to ruminate on it,
 and please pass on any concrete conclusions should you find them. However,
 if you pass them on via email, be sure to include a disclaimer regarding
 liability for transmission.
 *

 * In the event that the originator did not send this email to you, then
 please return it to us and attach a scanned-in picture of your mother's
 brother's wife wearing nothing but a kangaroo suit, and we will immediately
 refund you exactly half of what you paid for the can of Whiskas you bought
 when you went to Pets** ** At Home yesterday. *

 * We take no responsibility for non-receipt of this email because we are
 running Exchange 5.5 and everyone knows how glitchy that can be. In the
 event that you do get this message then please note that we take no
 responsibility for that either. Nor will we accept any liability, tacit or
 implied, for any damage you may or may not incur as a result of receiving,
 or not, as the case may be, from time to time, notwithstanding all
 liabilities implied or otherwise, ummm, hell, where was I...umm, no matter
 what happens, it is NOT, and NEVER WILL BE, OUR FAULT! *

 * The comments and opinions expressed herein are my own and NOT those of
 my employer, who, if he knew I was sending emails and surfing the seamier
 side of the Internet, would cut off my manhood and feed it to me for
 afternoon tea. *


 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe 

RE: file searching and copying

2011-07-20 Thread Joseph L. Casale
Powershell!
What's an example of your need?

From: Jeff Bunting [mailto:bunting.j...@gmail.com]
Sent: Wednesday, July 20, 2011 10:01 AM
To: NT System Admin Issues
Subject: file searching and copying

I'm attempting to search for particular words in a directory name (must use 
wildcards!), and, if found, copy the the directory tree while maintaining its 
structure to another directory.

Are there any native tools (or reskit like robocopy) that can accomplish this 
somewhat easily?

thanks,
Jeff

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: file searching and copying

2011-07-20 Thread Crawford, Scott
For /f tokens=* %i in ('dir *WORDS_TO_SEARCH* /s/a/b/ad') do robocopy /mir 
%i DESTINATION_PATH

This will search a folder tree for directorys.  Change the dir command to 
eliminate the /s if you only want to search the root.

From: Jeff Bunting [mailto:bunting.j...@gmail.com]
Sent: Wednesday, July 20, 2011 11:01 AM
To: NT System Admin Issues
Subject: file searching and copying

I'm attempting to search for particular words in a directory name (must use 
wildcards!), and, if found, copy the the directory tree while maintaining its 
structure to another directory.

Are there any native tools (or reskit like robocopy) that can accomplish this 
somewhat easily?

thanks,
Jeff

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: non-local admin revisited

2011-07-20 Thread Matthew B Ames
and if that fails, then simply remove the users hands :)

From: James Rankin [mailto:kz2...@googlemail.com]
Sent: 20 July 2011 17:02
To: NT System Admin Issues
Subject: Re: non-local admin revisited

It is if they have to type some credentials in. If they have admin accounts and 
will type their password in after clicking on anything, then they clearly 
need to have their admin accounts removed.
On 20 July 2011 16:59, Jim Dandy 
jda...@asmail.ucdavis.edumailto:jda...@asmail.ucdavis.edu wrote:
My users aren't smart enough to use UAC properly.  They'll click on
anything if they think that is what they need to do to get to whatever
they want to do.  No matter how much you warn them, a dimmed UAC screen
isn't going to inhibit their impulses.

 -Original Message-
 From: Kennedy, Jim 
 [mailto:kennedy...@elyriaschools.orgmailto:kennedy...@elyriaschools.org]
 Sent: Tuesday, July 19, 2011 6:37 PM
 To: NT System Admin Issues
 Subject: RE: non-local admin revisited


 Hmmm, I like this. With UAC on there is validity to running as an
admin all the
 time, IF you only have admin on your own machine. Less hassle for them
 with minimal risk. Very cool twist Andrew.


 
 From: Andrew S. Baker [asbz...@gmail.commailto:asbz...@gmail.com]
 Sent: Tuesday, July 19, 2011 8:11 PM
 To: NT System Admin Issues
 Subject: Re: non-local admin revisited


 IT members have Win7 and have local admin access of their own
machines,
 but with UAC enabled at the default level.

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
 http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here: http://lyris.sunbelt-
 software.com/read/my_forums/http://software.com/read/my_forums/
 or send an email to 
 listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



--
On two occasions...I have been asked, 'Pray, Mr Babbage, if you put into the 
machine wrong figures, will the right answers come out?' I am not able rightly 
to apprehend the kind of confusion of ideas that could provoke such a question.

* IMPORTANT INFORMATION/DISCLAIMER *

This document should be read only by those persons to whom it is addressed. If 
you have received this message it was obviously addressed to you and therefore 
you can read it, even it we didn't mean to send it to you. However, if the 
contents of this email make no sense whatsoever then you probably were not the 
intended recipient, or, alternatively, you are a mindless cretin; either way, 
you should immediately kill yourself and destroy your computer (not necessarily 
in that order). Once you have taken this action, please contact us.. no, sorry, 
you can't use your computer, because you just destroyed it, and possibly also 
committed suicide afterwards, but I am starting to digress..

The originator of this email is not liable for the transmission of the 
information contained in this communication. Or are they? Either way it's a 
pretty dull legal query and frankly one I'm not going to dwell on. But should 
you have nothing better to do, please feel free to ruminate on it, and please 
pass on any concrete conclusions should you find them. However, if you pass 
them on via email, be sure to include a disclaimer regarding liability for 
transmission.

In the event that the originator did not send this email to you, then please 
return it to us and attach a scanned-in picture of your mother's brother's wife 
wearing nothing but a kangaroo suit, and we will immediately refund you exactly 
half of what you paid for the can of Whiskas you bought when you went to Pets 
At Home yesterday.

We take no responsibility for non-receipt of this email because we are running 
Exchange 5.5 and everyone knows how glitchy that can be. In the event that you 
do get this message then please note that we take no responsibility for that 
either. Nor will we accept any liability, tacit or implied, for any damage you 
may or may not incur as a result of receiving, or not, as the case may be, from 
time to time, notwithstanding all liabilities implied or otherwise, ummm, hell, 
where was I...umm, no matter what happens, it is NOT, and NEVER WILL BE, OUR 
FAULT!

The comments and opinions expressed herein are my own and NOT those of my 
employer, who, if he knew I was sending emails and surfing the seamier side of 
the Internet, would cut off my manhood and feed it to me for afternoon tea.


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ 

Re: file searching and copying

2011-07-20 Thread Andrew S. Baker
You're going to have to script that, certainly.

You could use robocopy or xcopy or do the whole thing in powershell, but no
native tool provides the logic you want without some form of scripting.


For instance, assuming that you were going to start in the C:\TEMP folder,
and search for something:

@echo off
 SETLOCAL ENABLEDELAYEDEXPANSION
 for /f tokens=* %%v in ('dir /ad /b /s C:\Temp\*.*' ^| FIND /I
something) do (
   SET @DIR=%~fpv
   ECHO Copying !@DIR!
   XCOPY !@DIR! D:\SomeDestination /S /E /R /Y
 )






* *

*ASB* *http://about.me/Andrew.S.Baker* *Harnessing the Advantages of
Technology for the SMB market…

*



On Wed, Jul 20, 2011 at 12:00 PM, Jeff Bunting bunting.j...@gmail.comwrote:

 I'm attempting to search for particular words in a directory name (must use
 wildcards!), and, if found, copy the the directory tree while maintaining
 its structure to another directory.

 Are there any native tools (or reskit like robocopy) that can accomplish
 this somewhat easily?

 thanks,
 Jeff

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: file searching and copying

2011-07-20 Thread Andrew S. Baker
Good one, Scott.

Jeff, remember to add a % to each variable if used in a batch file, vs the
command line.



* *

*ASB* *http://about.me/Andrew.S.Baker* *Harnessing the Advantages of
Technology for the SMB market…

*



On Wed, Jul 20, 2011 at 12:13 PM, Crawford, Scott crawfo...@evangel.eduwrote:

  For /f “tokens=*” %i in (‘dir *WORDS_TO_SEARCH* /s/a/b/ad’) do robocopy
 /mir “%i” DESTINATION_PATH

 ** **

 This will search a folder tree for directorys.  Change the dir command to
 eliminate the /s if you only want to search the root.

 ** **

 *From:* Jeff Bunting [mailto:bunting.j...@gmail.com]
 *Sent:* Wednesday, July 20, 2011 11:01 AM

 *To:* NT System Admin Issues
 *Subject:* file searching and copying

 ** **

 I'm attempting to search for particular words in a directory name (must use
 wildcards!), and, if found, copy the the directory tree while maintaining
 its structure to another directory.

  

 Are there any native tools (or reskit like robocopy) that can accomplish
 this somewhat easily?  

  

 thanks,

 Jeff




~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: file searching and copying

2011-07-20 Thread Crawford, Scott
Thx

I'd also note that the /mir switch may not be exactly the option you want with 
robocopy, but that will copy the whole folder tree, deleting files at the 
destination if they're not at the source.

From: Andrew S. Baker [mailto:asbz...@gmail.com]
Sent: Wednesday, July 20, 2011 11:23 AM
To: NT System Admin Issues
Subject: Re: file searching and copying

Good one, Scott.

Jeff, remember to add a % to each variable if used in a batch file, vs the 
command line.


ASB

http://about.me/Andrew.S.Baker

Harnessing the Advantages of Technology for the SMB market...



On Wed, Jul 20, 2011 at 12:13 PM, Crawford, Scott 
crawfo...@evangel.edumailto:crawfo...@evangel.edu wrote:
For /f tokens=* %i in ('dir *WORDS_TO_SEARCH* /s/a/b/ad') do robocopy /mir 
%i DESTINATION_PATH

This will search a folder tree for directorys.  Change the dir command to 
eliminate the /s if you only want to search the root.

From: Jeff Bunting 
[mailto:bunting.j...@gmail.commailto:bunting.j...@gmail.com]
Sent: Wednesday, July 20, 2011 11:01 AM

To: NT System Admin Issues
Subject: file searching and copying

I'm attempting to search for particular words in a directory name (must use 
wildcards!), and, if found, copy the the directory tree while maintaining its 
structure to another directory.

Are there any native tools (or reskit like robocopy) that can accomplish this 
somewhat easily?

thanks,
Jeff



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: non-local admin revisited

2011-07-20 Thread Anders Blomgren
No, one of the two options that restricted groups offers replaces
everything. You can also create a restricted group policy for your IT Staff
Local Admin group and force said group to be a member of Administrators.

-Anders

On Tue, Jul 19, 2011 at 7:54 PM, Kennedy, Jim
kennedy...@elyriaschools.orgwrote:

  Create a domain group called IT Local Admins and add the domain IT Admin
 accounts you create to it.  Then add that group to the computers using
 restricted groups. Remember, restricted groups REPLACES everything in the
 local admin group when you apply that GPO. It does not add…it replaces.***
 *

 ** **

 *From:* David Lum [mailto:david@nwea.org]
 *Sent:* Tuesday, July 19, 2011 1:32 PM

 *To:* NT System Admin Issues
 *Subject:* RE: non-local admin revisited

  ** **

 A local admin account?  So 50 IT folks would have 50 different local admin
 accounts? Other than the deny log on locally what keeps them from creating
 an admin account while logged in as admin?

 ** **

 Win 7 makes alternate credentials easy enough at least…

 ** **

 Dave.

 ** **

 *From:* Kennedy, Jim [mailto:kennedy...@elyriaschools.org]
 *Sent:* Tuesday, July 19, 2011 10:20 AM
 *To:* NT System Admin Issues
 *Subject:* RE: non-local admin revisited

 ** **

 +1

 ** **

 *From:* Don Ely [mailto:don@gmail.com]
 *Sent:* Tuesday, July 19, 2011 1:19 PM
 *To:* NT System Admin Issues
 *Subject:* Re: non-local admin revisited

 ** **

 Provide them with an admin account and show them how to use run-as...  I
 also disable logon locally where I can get away with it so they don't
 cheat...

 On Tue, Jul 19, 2011 at 10:10 AM, David Lum david@nwea.org wrote:***
 *

 How do you bigger org’s handle IT staff (DBA’s and the like) not being
 local admins on their systems? Invariably they are used to throwing on
 whatever they want and in some ways this helps the Help desk so they’re not
 called to install stuff the user can install.

  

 As we move to Windows 7 my recommendation is to yank local admin perms at
 the same time (yes everyone is local admin on their XP systems currently),
 but I foresee pushback from Service Desk and IT folks…

 *David Lum*
 Systems Engineer // NWEATM
 Office 503.548.5229 //* *Cell (voice/text) 503.267.9764

  

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin

 ** **

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: file searching and copying

2011-07-20 Thread Jeff Bunting
Thanks all.  Scott's suggestion is close and at least got me pointed in the
right direction.  Some of the paths are too long for DIR which throws a
wrench in the works, so I'm going to have to rely on windows search for now.

Powershell, unfortunately, currently isn't an option.

Jeff
On Wed, Jul 20, 2011 at 12:23 PM, Andrew S. Baker asbz...@gmail.com wrote:

 Good one, Scott.

 Jeff, remember to add a % to each variable if used in a batch file, vs the
 command line.



 * *

 *ASB* *http://about.me/Andrew.S.Baker* *Harnessing the Advantages of
 Technology for the SMB market…

 *



 On Wed, Jul 20, 2011 at 12:13 PM, Crawford, Scott 
 crawfo...@evangel.eduwrote:

  For /f “tokens=*” %i in (‘dir *WORDS_TO_SEARCH* /s/a/b/ad’) do robocopy
 /mir “%i” DESTINATION_PATH

 ** **

 This will search a folder tree for directorys.  Change the dir command to
 eliminate the /s if you only want to search the root.

 ** **

 *From:* Jeff Bunting [mailto:bunting.j...@gmail.com]
 *Sent:* Wednesday, July 20, 2011 11:01 AM

 *To:* NT System Admin Issues
 *Subject:* file searching and copying

 ** **

 I'm attempting to search for particular words in a directory name (must
 use wildcards!), and, if found, copy the the directory tree while
 maintaining its structure to another directory.

  

 Are there any native tools (or reskit like robocopy) that can accomplish
 this somewhat easily?  

  

 thanks,

 Jeff


 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: file searching and copying

2011-07-20 Thread Jeff Bunting
yeah, I figured that one out pretty quickly.  (right after a
puzzled 'wh?' when there was only one file copied)  :-)

DIR wasn't giving me all of the files, so had to abandon it for now, but
thanks for the idea.

Jeff
On Wed, Jul 20, 2011 at 1:28 PM, Crawford, Scott crawfo...@evangel.eduwrote:

  Thx

 ** **

 I’d also note that the /mir switch may not be exactly the option you want
 with robocopy, but that will copy the whole folder tree, deleting files at
 the destination if they’re not at the source.

 ** **

 *From:* Andrew S. Baker [mailto:asbz...@gmail.com]
 *Sent:* Wednesday, July 20, 2011 11:23 AM

 *To:* NT System Admin Issues
 *Subject:* Re: file searching and copying

 ** **

 Good one, Scott.

 Jeff, remember to add a % to each variable if used in a batch file, vs the
 command line.


 

 *ASB*

 *http://about.me/Andrew.S.Baker*

 *Harnessing the Advantages of Technology for the SMB market…*



 

 On Wed, Jul 20, 2011 at 12:13 PM, Crawford, Scott crawfo...@evangel.edu
 wrote:

 For /f “tokens=*” %i in (‘dir *WORDS_TO_SEARCH* /s/a/b/ad’) do robocopy
 /mir “%i” DESTINATION_PATH

  

 This will search a folder tree for directorys.  Change the dir command to
 eliminate the /s if you only want to search the root.

  

 *From:* Jeff Bunting [mailto:bunting.j...@gmail.com]
 *Sent:* Wednesday, July 20, 2011 11:01 AM


 *To:* NT System Admin Issues
 *Subject:* file searching and copying

  

 I'm attempting to search for particular words in a directory name (must use
 wildcards!), and, if found, copy the the directory tree while maintaining
 its structure to another directory.

  

 Are there any native tools (or reskit like robocopy) that can accomplish
 this somewhat easily?  

  

 thanks,

 Jeff

 ** **

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Off-topic question -- POV Daughter Card

2011-07-20 Thread John Aldrich
Anyone know what a Promise of Value daughter card is? I bought some used IBM
Thinkcentre workstations and apparently the 30-pin connector on the
motherboard is for the daughter card. Anyone know what all these daughter
cards do and are they worth fussing with?






~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


RE: Off-topic question -- POV Daughter Card

2011-07-20 Thread Jim Holmgren
http://www.ask.com/faqcentral/IBM_CARD.html#1

Promise of Value (POV) card, a 256-bit encrypted security chip
daughtercard attached to the motherboard, which enables RFID antenna, C2
tamper switch, and Alert On LAN 2 support with a compatible network
adapter. If an attempt is made to remove the POV card from the board and
install it into another system, the cryptographic key material will be
erased, rendering it unusable. This security feature is by design and
prevents the cryptographic key migration from one system to another.
Therefore, moving this security chip from one board to another is not a
supported option. If an attempt is made to move the POV card from one
system to another, it may hang on boot and display an error message
referring to an invalid machine type and serial number.



Jim Holmgren
Director of Technology Infrastructure
XLHealth Corporation
The Warehouse at Camden Yards
351 West Camden Street, Suite 100
Baltimore, MD 21201 
410.625.2200 (main)
443.524.8573 (direct)
443-506.2400 (cell)
www.xlhealth.com



-Original Message-
From: John Aldrich [mailto:jaldr...@blueridgecarpet.com] 
Sent: Wednesday, July 20, 2011 3:15 PM
To: NT System Admin Issues
Subject: Off-topic question -- POV Daughter Card

Anyone know what a Promise of Value daughter card is? I bought some used
IBM Thinkcentre workstations and apparently the 30-pin connector on the
motherboard is for the daughter card. Anyone know what all these
daughter cards do and are they worth fussing with?






~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


CONFIDENTIALITY NOTICE: This email, including attachments, is for the sole use 
of the intended recipient(s) and may contain confidential and/or protected 
health information. Under the Federal Law (HIPAA), the intended recipient is 
obligated to keep this information secure and confidential. Any disclosure to 
third parties without authorization from the affiliate or as permitted by law 
is prohibited and punishable under Federal Law. If you are not the intended 
recipient, please contact the sender by reply e-mail and destroy all copies of 
the original message.

NOTA DE CONFIDENCIALIDAD: Este facsímile, incluyendo lo adjunto, es para el uso 
exclusivo del destinatario(s) y puede contener información confidencial y/o 
información protegida de salud. En virtud de la Ley Federal (HIPAA), el 
destinatario tiene la obligación de mantener esta información segura y 
confidencial. Cualquier divulgación a terceros sin la autorización de los 
miembros de lo permitido por la ley está prohibido y penado en virtud de la Ley 
Federal. Si usted no es el destinatario, por favor, póngase en contacto con el 
remitente por teléfono y destruir todas las copias del mensaje original

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



Re: Off-topic question -- POV Daughter Card

2011-07-20 Thread Steve Ens
Jim, you didn't happen to use google or bing to check for an answer did you?

On Wed, Jul 20, 2011 at 2:30 PM, Jim Holmgren jholmg...@xlhealth.comwrote:

 http://www.ask.com/faqcentral/IBM_CARD.html#1

 Promise of Value (POV) card, a 256-bit encrypted security chip
 daughtercard attached to the motherboard, which enables RFID antenna, C2
 tamper switch, and Alert On LAN 2 support with a compatible network
 adapter. If an attempt is made to remove the POV card from the board and
 install it into another system, the cryptographic key material will be
 erased, rendering it unusable. This security feature is by design and
 prevents the cryptographic key migration from one system to another.
 Therefore, moving this security chip from one board to another is not a
 supported option. If an attempt is made to move the POV card from one
 system to another, it may hang on boot and display an error message
 referring to an invalid machine type and serial number.



 Jim Holmgren
 Director of Technology Infrastructure
 XLHealth Corporation
 The Warehouse at Camden Yards
 351 West Camden Street, Suite 100
 Baltimore, MD 21201
 410.625.2200 (main)
 443.524.8573 (direct)
 443-506.2400 (cell)
 www.xlhealth.com



 -Original Message-
 From: John Aldrich [mailto:jaldr...@blueridgecarpet.com]
 Sent: Wednesday, July 20, 2011 3:15 PM
 To: NT System Admin Issues
 Subject: Off-topic question -- POV Daughter Card

 Anyone know what a Promise of Value daughter card is? I bought some used
 IBM Thinkcentre workstations and apparently the 30-pin connector on the
 motherboard is for the daughter card. Anyone know what all these
 daughter cards do and are they worth fussing with?






 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
 http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin


 CONFIDENTIALITY NOTICE: This email, including attachments, is for the sole
 use of the intended recipient(s) and may contain confidential and/or
 protected health information. Under the Federal Law (HIPAA), the intended
 recipient is obligated to keep this information secure and confidential. Any
 disclosure to third parties without authorization from the affiliate or as
 permitted by law is prohibited and punishable under Federal Law. If you are
 not the intended recipient, please contact the sender by reply e-mail and
 destroy all copies of the original message.

 NOTA DE CONFIDENCIALIDAD: Este facsímile, incluyendo lo adjunto, es para el
 uso exclusivo del destinatario(s) y puede contener información confidencial
 y/o información protegida de salud. En virtud de la Ley Federal (HIPAA), el
 destinatario tiene la obligación de mantener esta información segura y
 confidencial. Cualquier divulgación a terceros sin la autorización de los
 miembros de lo permitido por la ley está prohibido y penado en virtud de la
 Ley Federal. Si usted no es el destinatario, por favor, póngase en contacto
 con el remitente por teléfono y destruir todas las copias del mensaje
 original

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: Off-topic question -- POV Daughter Card

2011-07-20 Thread Jim Holmgren
Well...I found this cool thing online, for lack of a better term I will
refer to it as an Engine that actually allows me to perform a search
of the Interwebs.

 

-Jim

I got yer Google right here pal...

 

Jim Holmgren

Director of Technology Infrastructure

XLHealth Corporation

The Warehouse at Camden Yards

351 West Camden Street, Suite 100

Baltimore, MD 21201 

410.625.2200 (main)

443.524.8573 (direct)

443-506.2400 (cell)

www.xlhealth.com http://www.xlhealth.com/ 

 

 

 

From: Steve Ens [mailto:stevey...@gmail.com] 
Sent: Wednesday, July 20, 2011 3:34 PM
To: NT System Admin Issues
Subject: Re: Off-topic question -- POV Daughter Card

 

Jim, you didn't happen to use google or bing to check for an answer did
you?

On Wed, Jul 20, 2011 at 2:30 PM, Jim Holmgren jholmg...@xlhealth.com
wrote:

http://www.ask.com/faqcentral/IBM_CARD.html#1

Promise of Value (POV) card, a 256-bit encrypted security chip
daughtercard attached to the motherboard, which enables RFID antenna, C2
tamper switch, and Alert On LAN 2 support with a compatible network
adapter. If an attempt is made to remove the POV card from the board and
install it into another system, the cryptographic key material will be
erased, rendering it unusable. This security feature is by design and
prevents the cryptographic key migration from one system to another.
Therefore, moving this security chip from one board to another is not a
supported option. If an attempt is made to move the POV card from one
system to another, it may hang on boot and display an error message
referring to an invalid machine type and serial number.



Jim Holmgren
Director of Technology Infrastructure
XLHealth Corporation
The Warehouse at Camden Yards
351 West Camden Street, Suite 100
Baltimore, MD 21201
410.625.2200 (main)
443.524.8573 (direct)
443-506.2400 (cell)
www.xlhealth.com




-Original Message-
From: John Aldrich [mailto:jaldr...@blueridgecarpet.com]
Sent: Wednesday, July 20, 2011 3:15 PM
To: NT System Admin Issues
Subject: Off-topic question -- POV Daughter Card

Anyone know what a Promise of Value daughter card is? I bought some used
IBM Thinkcentre workstations and apparently the 30-pin connector on the
motherboard is for the daughter card. Anyone know what all these
daughter cards do and are they worth fussing with?







CONFIDENTIALITY NOTICE: This email, including attachments, is for the sole use 
of the intended recipient(s) and may contain confidential and/or protected 
health information. Under the Federal Law (HIPAA), the intended recipient is 
obligated to keep this information secure and confidential. Any disclosure to 
third parties without authorization from the affiliate or as permitted by law 
is prohibited and punishable under Federal Law. If you are not the intended 
recipient, please contact the sender by reply e-mail and destroy all copies of 
the original message.

NOTA DE CONFIDENCIALIDAD: Este facsímile, incluyendo lo adjunto, es para el uso 
exclusivo del destinatario(s) y puede contener información confidencial y/o 
información protegida de salud. En virtud de la Ley Federal (HIPAA), el 
destinatario tiene la obligación de mantener esta información segura y 
confidencial. Cualquier divulgación a terceros sin la autorización de los 
miembros de lo permitido por la ley está prohibido y penado en virtud de la Ley 
Federal. Si usted no es el destinatario, por favor, póngase en contacto con el 
remitente por teléfono y destruir todas las copias del mensaje original
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

IIS6:Execute permissions on \bin folder keep resetting

2011-07-20 Thread Christopher Bodnar
I'm having this exact problem on a W2K3 IIS 6 server:

http://forums.asp.net/t/1073368.aspx/1

Anyone see this before? 


Chris Bodnar, MCSE, MCITP
Technical Support III
Distributed Systems Service Delivery - Intel Services
Guardian Life Insurance Company of America
Email: christopher_bod...@glic.com
Phone: 610-807-6459
Fax: 610-807-6003

-
This message, and any attachments to it, may contain information
that is privileged, confidential, and exempt from disclosure under
applicable law.  If the reader of this message is not the intended
recipient, you are notified that any use, dissemination,
distribution, copying, or communication of this message is strictly
prohibited.  If you have received this message in error, please
notify the sender immediately by return e-mail and delete the
message and any attachments.  Thank you.
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: file searching and copying

2011-07-20 Thread Crawford, Scott
So, you are searching a whole tree?  Seems like you'd end up with duplicates if 
the search terms show up at one level and a sublevel.  If you're just searching 
one level, you might try subst to shorten the paths. For instance, if your base 
is c:\long\path\to\root, you can run subst x: c:\long\path\to\root to trim a 
bunch off the length.

From: Jeff Bunting [mailto:bunting.j...@gmail.com]
Sent: Wednesday, July 20, 2011 1:25 PM
To: NT System Admin Issues
Subject: Re: file searching and copying

Thanks all.  Scott's suggestion is close and at least got me pointed in the 
right direction.  Some of the paths are too long for DIR which throws a wrench 
in the works, so I'm going to have to rely on windows search for now.

Powershell, unfortunately, currently isn't an option.

Jeff
On Wed, Jul 20, 2011 at 12:23 PM, Andrew S. Baker 
asbz...@gmail.commailto:asbz...@gmail.com wrote:
Good one, Scott.

Jeff, remember to add a % to each variable if used in a batch file, vs the 
command line.



ASB

http://about.me/Andrew.S.Baker

Harnessing the Advantages of Technology for the SMB market...



On Wed, Jul 20, 2011 at 12:13 PM, Crawford, Scott 
crawfo...@evangel.edumailto:crawfo...@evangel.edu wrote:
For /f tokens=* %i in ('dir *WORDS_TO_SEARCH* /s/a/b/ad') do robocopy /mir 
%i DESTINATION_PATH

This will search a folder tree for directorys.  Change the dir command to 
eliminate the /s if you only want to search the root.

From: Jeff Bunting 
[mailto:bunting.j...@gmail.commailto:bunting.j...@gmail.com]
Sent: Wednesday, July 20, 2011 11:01 AM

To: NT System Admin Issues
Subject: file searching and copying

I'm attempting to search for particular words in a directory name (must use 
wildcards!), and, if found, copy the the directory tree while maintaining its 
structure to another directory.

Are there any native tools (or reskit like robocopy) that can accomplish this 
somewhat easily?

thanks,
Jeff



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: Off-topic question -- POV Daughter Card

2011-07-20 Thread Steve Ens
They have those now?  Wow man, that is groovy!

On Wed, Jul 20, 2011 at 2:39 PM, Jim Holmgren jholmg...@xlhealth.comwrote:

 Well…I found this cool thing online, for lack of a better term I will refer
 to it as an “Engine” that actually allows me to perform a “search” of the
 Interwebs.

 ** **

 -Jim

 “I got yer Google right here pal…”

 ** **

 Jim Holmgren

 Director of Technology Infrastructure

 XLHealth Corporation

 The Warehouse at Camden Yards

 351 West Camden Street, Suite 100

 Baltimore, MD 21201 

 410.625.2200 (main)

 443.524.8573 (direct)

 443-506.2400 (cell)

 www.xlhealth.com

 ** **

 ** **

 ** **

 *From:* Steve Ens [mailto:stevey...@gmail.com]
 *Sent:* Wednesday, July 20, 2011 3:34 PM

 *To:* NT System Admin Issues
 *Subject:* Re: Off-topic question -- POV Daughter Card

 ** **

 Jim, you didn't happen to use google or bing to check for an answer did
 you?

 On Wed, Jul 20, 2011 at 2:30 PM, Jim Holmgren jholmg...@xlhealth.com
 wrote:

 http://www.ask.com/faqcentral/IBM_CARD.html#1

 Promise of Value (POV) card, a 256-bit encrypted security chip
 daughtercard attached to the motherboard, which enables RFID antenna, C2
 tamper switch, and Alert On LAN 2 support with a compatible network
 adapter. If an attempt is made to remove the POV card from the board and
 install it into another system, the cryptographic key material will be
 erased, rendering it unusable. This security feature is by design and
 prevents the cryptographic key migration from one system to another.
 Therefore, moving this security chip from one board to another is not a
 supported option. If an attempt is made to move the POV card from one
 system to another, it may hang on boot and display an error message
 referring to an invalid machine type and serial number.



 Jim Holmgren
 Director of Technology Infrastructure
 XLHealth Corporation
 The Warehouse at Camden Yards
 351 West Camden Street, Suite 100
 Baltimore, MD 21201
 410.625.2200 (main)
 443.524.8573 (direct)
 443-506.2400 (cell)
 www.xlhealth.com




 -Original Message-
 From: John Aldrich [mailto:jaldr...@blueridgecarpet.com]
 Sent: Wednesday, July 20, 2011 3:15 PM
 To: NT System Admin Issues
 Subject: Off-topic question -- POV Daughter Card

 Anyone know what a Promise of Value daughter card is? I bought some used
 IBM Thinkcentre workstations and apparently the 30-pin connector on the
 motherboard is for the daughter card. Anyone know what all these
 daughter cards do and are they worth fussing with?



 

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin

 CONFIDENTIALITY NOTICE: This email, including attachments, is for the sole
 use of the intended recipient(s) and may contain confidential and/or
 protected health information. Under the Federal Law (HIPAA), the intended
 recipient is obligated to keep this information secure and confidential. Any
 disclosure to third parties without authorization from the affiliate or as
 permitted by law is prohibited and punishable under Federal Law. If you are
 not the intended recipient, please contact the sender by reply e-mail and
 destroy all copies of the original message.

 NOTA DE CONFIDENCIALIDAD: Este mensaje incluyendo cualquier anejo es para
 uso exclusivo del (los) destinatario (s) y puede incluir información
 confidencial y/o información de salud protegida. La Ley Federal (HIPAA)
 establece que el destinatario está obligado a mantener la información
 confidencial y sequra. HIPAA prohíbe y castiga cualquier divulgación a
 terceras personas sin autorización del afiliado o permitido por ley. Si
 usted no es el destinatario, redirija esta mensaje al remitente, y destruye
 cualquier copia existente del mensaje original.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: file searching and copying

2011-07-20 Thread Andrew S. Baker
How long are the paths?

There are other ways to handle this, btw...

Try the following snippet.  It should handle long folders even if Windows
complains about them

@echo off
 SETLOCAL ENABLEDELAYEDEXPANSION
 SET @SOURCE=%SystemDrive%
 SET @DEST=D:\SomePlace
 SET @FIND=PrivacIE

:Main
 for /f tokens=* %%v in ('dir /ad /b /s %@SOURCE%\*.* 2^NUL ^| FIND /I
%@FIND%') do (
   SET @DIR=%%~fpv
   ECHO.
   ECHO SOURCE: !@DIR!
   ECHO   DEST: %@DEST%\%%~pv
   PUSHD !@DIR!
   echo XCOPY *.* %@DEST%%%~pv /S /E /R /Y
   ECHO.
   POPD
 )


:ExitBatch
 ENDLOCAL





* *

*ASB* *http://about.me/Andrew.S.Baker* *Harnessing the Advantages of
Technology for the SMB market…

*



On Wed, Jul 20, 2011 at 2:24 PM, Jeff Bunting bunting.j...@gmail.comwrote:

 Thanks all.  Scott's suggestion is close and at least got me pointed in the
 right direction.  Some of the paths are too long for DIR which throws a
 wrench in the works, so I'm going to have to rely on windows search for now.

 Powershell, unfortunately, currently isn't an option.

 Jeff
 On Wed, Jul 20, 2011 at 12:23 PM, Andrew S. Baker asbz...@gmail.comwrote:

 Good one, Scott.

 Jeff, remember to add a % to each variable if used in a batch file, vs the
 command line.



 * *

 *ASB* *http://about.me/Andrew.S.Baker* *Harnessing the Advantages of
 Technology for the SMB market…

 *



 On Wed, Jul 20, 2011 at 12:13 PM, Crawford, Scott 
 crawfo...@evangel.eduwrote:

  For /f “tokens=*” %i in (‘dir *WORDS_TO_SEARCH* /s/a/b/ad’) do robocopy
 /mir “%i” DESTINATION_PATH

 ** **

 This will search a folder tree for directorys.  Change the dir command to
 eliminate the /s if you only want to search the root.

 ** **

 *From:* Jeff Bunting [mailto:bunting.j...@gmail.com]
 *Sent:* Wednesday, July 20, 2011 11:01 AM

 *To:* NT System Admin Issues
 *Subject:* file searching and copying

 ** **

 I'm attempting to search for particular words in a directory name (must
 use wildcards!), and, if found, copy the the directory tree while
 maintaining its structure to another directory.

  

 Are there any native tools (or reskit like robocopy) that can accomplish
 this somewhat easily?  

  

 thanks,

 Jeff


 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin


 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: Off-topic question -- POV Daughter Card

2011-07-20 Thread Shauna Hensala

Imagine the possibilities...

Shauna Hensala




Subject: RE: Off-topic question -- POV Daughter Card
Date: Wed, 20 Jul 2011 15:39:28 -0400
From: jholmg...@xlhealth.com
To: ntsysadmin@lyris.sunbelt-software.com



Well…I found this cool thing online, for lack of a better term I will refer to 
it as an “Engine” that actually allows me to perform a “search” of the 
Interwebs. -Jim“I got yer Google right here pal…” Jim HolmgrenDirector of 
Technology InfrastructureXLHealth CorporationThe Warehouse at Camden Yards351 
West Camden Street, Suite 100Baltimore, MD 21201 410.625.2200 
(main)443.524.8573 (direct)443-506.2400 (cell)www.xlhealth.com   From: Steve 
Ens [mailto:stevey...@gmail.com] 
Sent: Wednesday, July 20, 2011 3:34 PM
To: NT System Admin Issues
Subject: Re: Off-topic question -- POV Daughter Card Jim, you didn't happen to 
use google or bing to check for an answer did you?On Wed, Jul 20, 2011 at 2:30 
PM, Jim Holmgren jholmg...@xlhealth.com 
wrote:http://www.ask.com/faqcentral/IBM_CARD.html#1

Promise of Value (POV) card, a 256-bit encrypted security chip
daughtercard attached to the motherboard, which enables RFID antenna, C2
tamper switch, and Alert On LAN 2 support with a compatible network
adapter. If an attempt is made to remove the POV card from the board and
install it into another system, the cryptographic key material will be
erased, rendering it unusable. This security feature is by design and
prevents the cryptographic key migration from one system to another.
Therefore, moving this security chip from one board to another is not a
supported option. If an attempt is made to move the POV card from one
system to another, it may hang on boot and display an error message
referring to an invalid machine type and serial number.



Jim Holmgren
Director of Technology Infrastructure
XLHealth Corporation
The Warehouse at Camden Yards
351 West Camden Street, Suite 100
Baltimore, MD 21201
410.625.2200 (main)
443.524.8573 (direct)
443-506.2400 (cell)
www.xlhealth.com


-Original Message-
From: John Aldrich [mailto:jaldr...@blueridgecarpet.com]
Sent: Wednesday, July 20, 2011 3:15 PM
To: NT System Admin Issues
Subject: Off-topic question -- POV Daughter Card

Anyone know what a Promise of Value daughter card is? I bought some used
IBM Thinkcentre workstations and apparently the 30-pin connector on the
motherboard is for the daughter card. Anyone know what all these
daughter cards do and are they worth fussing with?




~ Finally, powerful endpoint security that ISN'T a resource hog! ~

~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~



---

To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/

or send an email to listmana...@lyris.sunbeltsoftware.com

with the body: unsubscribe ntsysadmin





CONFIDENTIALITY NOTICE: This email, including attachments, is for the sole use 
of the intended recipient(s) and may contain confidential and/or protected 
health information. Under the Federal Law (HIPAA), the intended recipient is 
obligated to keep this information secure and confidential. Any disclosure to 
third parties without authorization from the affiliate or as permitted by law 
is prohibited and punishable under Federal Law. If you are not the intended 
recipient, please contact the sender by reply e-mail and destroy all copies of 
the original message.



NOTA DE CONFIDENCIALIDAD: Este mensaje incluyendo cualquier anejo es para uso 
exclusivo del (los) destinatario (s) y puede incluir información confidencial 
y/o información de salud protegida. La Ley Federal (HIPAA) establece que el 
destinatario está obligado a mantener la información confidencial y sequra. 
HIPAA prohíbe y castiga cualquier divulgación a terceras personas sin 
autorización del afiliado o permitido por ley. Si usted no es el destinatario, 
redirija esta mensaje al remitente, y destruye cualquier copia existente del 
mensaje original.   
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: Off-topic question -- POV Daughter Card

2011-07-20 Thread Jonathan Link
Now imagine what happens to society when they become unavailable.

On Wed, Jul 20, 2011 at 4:25 PM, Shauna Hensala she...@msn.com wrote:

  Imagine the possibilities...

 [image: Red rose]Shauna Hensala




 --
 Subject: RE: Off-topic question -- POV Daughter Card
 Date: Wed, 20 Jul 2011 15:39:28 -0400
 From: jholmg...@xlhealth.com
 To: ntsysadmin@lyris.sunbelt-software.com


 Well…I found this cool thing online, for lack of a better term I will refer
 to it as an “Engine” that actually allows me to perform a “search” of the
 Interwebs.



 -Jim

 “I got yer Google right here pal…”



 Jim Holmgren

 Director of Technology Infrastructure

 XLHealth Corporation

 The Warehouse at Camden Yards

 351 West Camden Street, Suite 100

 Baltimore, MD 21201

 410.625.2200 (main)

 443.524.8573 (direct)

 443-506.2400 (cell)

 www.xlhealth.com







 *From:* Steve Ens [mailto:stevey...@gmail.com]
 *Sent:* Wednesday, July 20, 2011 3:34 PM
 *To:* NT System Admin Issues
 *Subject:* Re: Off-topic question -- POV Daughter Card



 Jim, you didn't happen to use google or bing to check for an answer did
 you?

 On Wed, Jul 20, 2011 at 2:30 PM, Jim Holmgren jholmg...@xlhealth.com
 wrote:

 http://www.ask.com/faqcentral/IBM_CARD.html#1

 Promise of Value (POV) card, a 256-bit encrypted security chip
 daughtercard attached to the motherboard, which enables RFID antenna, C2
 tamper switch, and Alert On LAN 2 support with a compatible network
 adapter. If an attempt is made to remove the POV card from the board and
 install it into another system, the cryptographic key material will be
 erased, rendering it unusable. This security feature is by design and
 prevents the cryptographic key migration from one system to another.
 Therefore, moving this security chip from one board to another is not a
 supported option. If an attempt is made to move the POV card from one
 system to another, it may hang on boot and display an error message
 referring to an invalid machine type and serial number.



 Jim Holmgren
 Director of Technology Infrastructure
 XLHealth Corporation
 The Warehouse at Camden Yards
 351 West Camden Street, Suite 100
 Baltimore, MD 21201
 410.625.2200 (main)
 443.524.8573 (direct)
 443-506.2400 (cell)
 www.xlhealth.com




 -Original Message-
 From: John Aldrich [mailto:jaldr...@blueridgecarpet.com]
 Sent: Wednesday, July 20, 2011 3:15 PM
 To: NT System Admin Issues
 Subject: Off-topic question -- POV Daughter Card

 Anyone know what a Promise of Value daughter card is? I bought some used
 IBM Thinkcentre workstations and apparently the 30-pin connector on the
 motherboard is for the daughter card. Anyone know what all these
 daughter cards do and are they worth fussing with?



 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin

 CONFIDENTIALITY NOTICE: This email, including attachments, is for the sole
 use of the intended recipient(s) and may contain confidential and/or
 protected health information. Under the Federal Law (HIPAA), the intended
 recipient is obligated to keep this information secure and confidential. Any
 disclosure to third parties without authorization from the affiliate or as
 permitted by law is prohibited and punishable under Federal Law. If you are
 not the intended recipient, please contact the sender by reply e-mail and
 destroy all copies of the original message.

 NOTA DE CONFIDENCIALIDAD: Este mensaje incluyendo cualquier anejo es para
 uso exclusivo del (los) destinatario (s) y puede incluir información
 confidencial y/o información de salud protegida. La Ley Federal (HIPAA)
 establece que el destinatario está obligado a mantener la información
 confidencial y sequra. HIPAA prohíbe y castiga cualquier divulgación a
 terceras personas sin autorización del afiliado o permitido por ley. Si
 usted no es el destinatario, redirija esta mensaje al remitente, y destruye
 cualquier copia existente del mensaje original.

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: Off-topic question -- POV Daughter Card

2011-07-20 Thread Kim Longenbaugh
Overhead projectors

From: Jonathan Link [mailto:jonathan.l...@gmail.com]
Sent: Wednesday, July 20, 2011 3:27 PM
To: NT System Admin Issues
Subject: Re: Off-topic question -- POV Daughter Card

Now imagine what happens to society when they become unavailable.
On Wed, Jul 20, 2011 at 4:25 PM, Shauna Hensala 
she...@msn.commailto:she...@msn.com wrote:
Imagine the possibilities...

[Red rose]Shauna Hensala




Subject: RE: Off-topic question -- POV Daughter Card
Date: Wed, 20 Jul 2011 15:39:28 -0400
From: jholmg...@xlhealth.commailto:jholmg...@xlhealth.com
To: 
ntsysadmin@lyris.sunbelt-software.commailto:ntsysadmin@lyris.sunbelt-software.com


Well...I found this cool thing online, for lack of a better term I will refer 
to it as an Engine that actually allows me to perform a search of the 
Interwebs.



-Jim

I got yer Google right here pal...



Jim Holmgren

Director of Technology Infrastructure

XLHealth Corporation

The Warehouse at Camden Yards

351 West Camden Street, Suite 100

Baltimore, MD 21201

410.625.2200tel:410.625.2200 (main)

443.524.8573tel:443.524.8573 (direct)

443-506.2400tel:443-506.2400 (cell)

www.xlhealth.comhttp://www.xlhealth.com/







From: Steve Ens [mailto:stevey...@gmail.commailto:stevey...@gmail.com]
Sent: Wednesday, July 20, 2011 3:34 PM
To: NT System Admin Issues
Subject: Re: Off-topic question -- POV Daughter Card



Jim, you didn't happen to use google or bing to check for an answer did you?

On Wed, Jul 20, 2011 at 2:30 PM, Jim Holmgren 
jholmg...@xlhealth.commailto:jholmg...@xlhealth.com wrote:

http://www.ask.com/faqcentral/IBM_CARD.html#1

Promise of Value (POV) card, a 256-bit encrypted security chip
daughtercard attached to the motherboard, which enables RFID antenna, C2
tamper switch, and Alert On LAN 2 support with a compatible network
adapter. If an attempt is made to remove the POV card from the board and
install it into another system, the cryptographic key material will be
erased, rendering it unusable. This security feature is by design and
prevents the cryptographic key migration from one system to another.
Therefore, moving this security chip from one board to another is not a
supported option. If an attempt is made to move the POV card from one
system to another, it may hang on boot and display an error message
referring to an invalid machine type and serial number.



Jim Holmgren
Director of Technology Infrastructure
XLHealth Corporation
The Warehouse at Camden Yards
351 West Camden Street, Suite 100
Baltimore, MD 21201
410.625.2200 (main)
443.524.8573 (direct)
443-506.2400 (cell)
www.xlhealth.comhttp://www.xlhealth.com



-Original Message-
From: John Aldrich 
[mailto:jaldr...@blueridgecarpet.commailto:jaldr...@blueridgecarpet.com]
Sent: Wednesday, July 20, 2011 3:15 PM
To: NT System Admin Issues
Subject: Off-topic question -- POV Daughter Card

Anyone know what a Promise of Value daughter card is? I bought some used
IBM Thinkcentre workstations and apparently the 30-pin connector on the
motherboard is for the daughter card. Anyone know what all these
daughter cards do and are they worth fussing with?


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

CONFIDENTIALITY NOTICE: This email, including attachments, is for the sole use 
of the intended recipient(s) and may contain confidential and/or protected 
health information. Under the Federal Law (HIPAA), the intended recipient is 
obligated to keep this information secure and confidential. Any disclosure to 
third parties without authorization from the affiliate or as permitted by law 
is prohibited and punishable under Federal Law. If you are not the intended 
recipient, please contact the sender by reply e-mail and destroy all copies of 
the original message.

NOTA DE CONFIDENCIALIDAD: Este mensaje incluyendo cualquier anejo es para uso 
exclusivo del (los) destinatario (s) y puede incluir información confidencial 
y/o información de salud protegida. La Ley Federal (HIPAA) establece que el 
destinatario está obligado a mantener la información confidencial y sequra. 
HIPAA prohíbe y castiga cualquier divulgación a terceras personas sin 
autorización del afiliado o permitido por ley. Si usted no es el destinatario, 
redirija esta mensaje al remitente, y destruye cualquier copia existente del 
mensaje original.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com
with the body: 

Re: Off-topic question -- POV Daughter Card

2011-07-20 Thread Daniel Rodriguez
Interweb? Sounds Fasinating!

What do they taste like?

drod...@gmail.com
Sent via Dell Streak 7
On Jul 20, 2011 4:05 PM, Steve Ens stevey...@gmail.com wrote:
 They have those now? Wow man, that is groovy!

 On Wed, Jul 20, 2011 at 2:39 PM, Jim Holmgren jholmg...@xlhealth.com
wrote:

 Well…I found this cool thing online, for lack of a better term I will
refer
 to it as an “Engine” that actually allows me to perform a “search” of the
 Interwebs.

 ** **

 -Jim

 “I got yer Google right here pal…”

 ** **

 Jim Holmgren

 Director of Technology Infrastructure

 XLHealth Corporation

 The Warehouse at Camden Yards

 351 West Camden Street, Suite 100

 Baltimore, MD 21201 

 410.625.2200 (main)

 443.524.8573 (direct)

 443-506.2400 (cell)

 www.xlhealth.com

 ** **

 ** **

 ** **

 *From:* Steve Ens [mailto:stevey...@gmail.com]
 *Sent:* Wednesday, July 20, 2011 3:34 PM

 *To:* NT System Admin Issues
 *Subject:* Re: Off-topic question -- POV Daughter Card

 ** **

 Jim, you didn't happen to use google or bing to check for an answer did
 you?

 On Wed, Jul 20, 2011 at 2:30 PM, Jim Holmgren jholmg...@xlhealth.com
 wrote:

 http://www.ask.com/faqcentral/IBM_CARD.html#1

 Promise of Value (POV) card, a 256-bit encrypted security chip
 daughtercard attached to the motherboard, which enables RFID antenna, C2
 tamper switch, and Alert On LAN 2 support with a compatible network
 adapter. If an attempt is made to remove the POV card from the board and
 install it into another system, the cryptographic key material will be
 erased, rendering it unusable. This security feature is by design and
 prevents the cryptographic key migration from one system to another.
 Therefore, moving this security chip from one board to another is not a
 supported option. If an attempt is made to move the POV card from one
 system to another, it may hang on boot and display an error message
 referring to an invalid machine type and serial number.



 Jim Holmgren
 Director of Technology Infrastructure
 XLHealth Corporation
 The Warehouse at Camden Yards
 351 West Camden Street, Suite 100
 Baltimore, MD 21201
 410.625.2200 (main)
 443.524.8573 (direct)
 443-506.2400 (cell)
 www.xlhealth.com




 -Original Message-
 From: John Aldrich [mailto:jaldr...@blueridgecarpet.com]
 Sent: Wednesday, July 20, 2011 3:15 PM
 To: NT System Admin Issues
 Subject: Off-topic question -- POV Daughter Card

 Anyone know what a Promise of Value daughter card is? I bought some used
 IBM Thinkcentre workstations and apparently the 30-pin connector on the
 motherboard is for the daughter card. Anyone know what all these
 daughter cards do and are they worth fussing with?



 

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin

 CONFIDENTIALITY NOTICE: This email, including attachments, is for the
sole
 use of the intended recipient(s) and may contain confidential and/or
 protected health information. Under the Federal Law (HIPAA), the intended
 recipient is obligated to keep this information secure and confidential.
Any
 disclosure to third parties without authorization from the affiliate or
as
 permitted by law is prohibited and punishable under Federal Law. If you
are
 not the intended recipient, please contact the sender by reply e-mail and
 destroy all copies of the original message.

 NOTA DE CONFIDENCIALIDAD: Este mensaje incluyendo cualquier anejo es para
 uso exclusivo del (los) destinatario (s) y puede incluir información
 confidencial y/o información de salud protegida. La Ley Federal (HIPAA)
 establece que el destinatario está obligado a mantener la información
 confidencial y sequra. HIPAA prohíbe y castiga cualquier divulgación a
 terceras personas sin autorización del afiliado o permitido por ley. Si
 usted no es el destinatario, redirija esta mensaje al remitente, y
destruye
 cualquier copia existente del mensaje original.

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~

 ---
 To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: With ISA / TMG going away...

2011-07-20 Thread Crawford, Scott
Is this happening for sure?  Are they rolling TMG into UAG? I'd hate to see the 
whole product die.

From: G.Waleed Kavalec [mailto:kava...@gmail.com]
Sent: Wednesday, July 06, 2011 8:56 AM
To: NT System Admin Issues
Subject: With ISA / TMG going away...

Or into no more upgrade status, what would this list recommend as the path 
forward for a small-to-medium sized shop?

We still use ISA 2006 and had been looking at Threat Management Gateway.

We have two sites, and do major service-bureau and specialized hosting kind of 
work.  All Windows. Mostly 2008.


--
G. Waleed Kavalec
__
Remember when teachers, public employees, unions, npr, pbs, and planned 
parenthood crashed the stock market, took trillions in TARP money, spilled a 
crapload of oil in the Gulf of Mexico, wiped out half of our 401ks, gave 
themselves billions in bonuses, and payed no taxes? Yeah - me, neither.



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: With ISA / TMG going away...

2011-07-20 Thread G.Waleed Kavalec
They are very vague on it, all that is certain is no upgrade path for TMG.



On Wed, Jul 20, 2011 at 5:07 PM, Crawford, Scott crawfo...@evangel.eduwrote:

  Is this happening for sure?  Are they rolling TMG into UAG? I’d hate to
 see the whole product die.

 ** **

 *From:* G.Waleed Kavalec [mailto:kava...@gmail.com]
 *Sent:* Wednesday, July 06, 2011 8:56 AM
 *To:* NT System Admin Issues
 *Subject:* With ISA / TMG going away...

 ** **

 Or into no more upgrade status, what would this list recommend as the
 path forward for a small-to-medium sized shop?

 ** **

 We still use ISA 2006 and had been looking at Threat Management Gateway.**
 **

 ** **

 We have two sites, and do major service-bureau and specialized hosting kind
 of work.  All Windows. Mostly 2008.



 -- 

 G. Waleed Kavalec

 __

 Remember when teachers, public employees, unions, npr, pbs, and planned
 parenthood crashed the stock market, took trillions in TARP money, spilled a
 crapload of oil in the Gulf of Mexico, wiped out half of our 401ks, gave
 themselves billions in bonuses, and payed no taxes? Yeah - me, neither.***
 *

  

 ** **

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin




-- 
G. Waleed Kavalec
__
Remember when teachers, public employees, unions, npr, pbs, and planned
parenthood crashed the stock market, took trillions in TARP money, spilled a
crapload of oil in the Gulf of Mexico, wiped out half of our 401ks, gave
themselves billions in bonuses, and payed no taxes? Yeah - me, neither.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: With ISA / TMG going away...

2011-07-20 Thread Crawford, Scott
Do you have an official link to that or just what someone heard an MS rep say?  
I've just not seen it officially stated anywhere.

From: G.Waleed Kavalec [mailto:kava...@gmail.com]
Sent: Wednesday, July 20, 2011 5:30 PM
To: NT System Admin Issues
Subject: Re: With ISA / TMG going away...

They are very vague on it, all that is certain is no upgrade path for TMG.


On Wed, Jul 20, 2011 at 5:07 PM, Crawford, Scott 
crawfo...@evangel.edumailto:crawfo...@evangel.edu wrote:
Is this happening for sure?  Are they rolling TMG into UAG? I'd hate to see the 
whole product die.

From: G.Waleed Kavalec [mailto:kava...@gmail.commailto:kava...@gmail.com]
Sent: Wednesday, July 06, 2011 8:56 AM
To: NT System Admin Issues
Subject: With ISA / TMG going away...

Or into no more upgrade status, what would this list recommend as the path 
forward for a small-to-medium sized shop?

We still use ISA 2006 and had been looking at Threat Management Gateway.

We have two sites, and do major service-bureau and specialized hosting kind of 
work.  All Windows. Mostly 2008.


--
G. Waleed Kavalec
__
Remember when teachers, public employees, unions, npr, pbs, and planned 
parenthood crashed the stock market, took trillions in TARP money, spilled a 
crapload of oil in the Gulf of Mexico, wiped out half of our 401ks, gave 
themselves billions in bonuses, and payed no taxes? Yeah - me, neither.



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



--
G. Waleed Kavalec
__
Remember when teachers, public employees, unions, npr, pbs, and planned 
parenthood crashed the stock market, took trillions in TARP money, spilled a 
crapload of oil in the Gulf of Mexico, wiped out half of our 401ks, gave 
themselves billions in bonuses, and payed no taxes? Yeah - me, neither.



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: Dell Lock Code Resource

2011-07-20 Thread Micheal Espinola Jr
I always just search online, e.g.:

http://www.google.com/search?q=dell+post+codes

It doesnt surprise me that Dell has taken a position to keep details like
this.  They are getting more and more uptight about what they consider
free support.

--
Espi





On Wed, Jul 20, 2011 at 2:21 PM, Mike Gill lis...@canbyfoursquare.comwrote:

 Does anyone have a resource for the LED Lock codes on Dell’s laptops? For
 example, when a laptop doesn’t start up and you get the num and caps lock
 LED’s flashing but the scroll lock LED is solid. Dell says they don’t
 publish this, and I have found on older document on their website that shows
 the codes, and one resource online, I would like an up to date resource that
 includes Latitude’s, Inspiron’s and Vostro’s rather than calling Dell up
 every time. For example:

 ** **

 http://www.bay-wolf.com/portpostcodes.htm

 ** **

 FYI, this info isn’t provided in the manual’s online either.

 ** **

 --
 Mike Gill

 ** **

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

RE: file searching and copying

2011-07-20 Thread Crawford, Scott
Nice to see pushd and popd making an appearance :)

Few nits and questions, just to make sure I'm not missing something:


1.   The echo in front of xcopy shouldn't be there. I'm sure it's just 
there for troubleshooting and left as an oversight. The /s /e is redundant, 
right?

2.   I'm not very practiced with the enhanced ~ substitution, but couldn't 
the SET @DIR=%%~fpv line omit the p?

3.   I think the ECHO   DEST: %@DEST%\%%~pv line has an extra \

4.   I think the xcopy's destination parameter (%@DEST%%%~pv) needs to be 
%@DEST%%%~pnv.  Without it, the files get copied into the corresponding 
parent on the destination.

5.   Is there any way to get the parentheses code blocks work from the 
command line or do they need to be inside of a .bat? I've tried stringing the 
commands together with , but met with limited success.

Possible drawback to this method:

The destination path will contain the full path of the source. For instance, if 
the source root is C:\a\b\c and it contains a folder called Search_Term, and we 
wan't the destination to be D:\, when we run the script, the destination will 
contain D:\a\b\c\Search_Term, which may not be the goal.

In the end, I don't think this is getting any better results the my original 
line. The 2NUL is just hiding the failures.

Thanks for the script though, it was fun to digest :)

From: Andrew S. Baker [mailto:asbz...@gmail.com]
Sent: Wednesday, July 20, 2011 3:06 PM
To: NT System Admin Issues
Subject: Re: file searching and copying

How long are the paths?

There are other ways to handle this, btw...

Try the following snippet.  It should handle long folders even if Windows 
complains about them
@echo off
 SETLOCAL ENABLEDELAYEDEXPANSION
 SET @SOURCE=%SystemDrive%
 SET @DEST=D:\SomePlace
 SET @FIND=PrivacIE

:Main
 for /f tokens=* %%v in ('dir /ad /b /s 
%@SOURCE%\*.*mailto:%25@SOURCE%25\*.* 2^NUL ^| FIND /I %@FIND%') do (
   SET @DIR=%%~fpv
   ECHO.
   ECHO SOURCE: !@DIR!
   ECHO   DEST: %@DEST%\%%~pv
   PUSHD !@DIR!
   echo XCOPY *.* %@DEST%%%~pv /S /E /R /Y
   ECHO.
   POPD
 )


:ExitBatch
 ENDLOCAL




ASB

http://about.me/Andrew.S.Baker

Harnessing the Advantages of Technology for the SMB market...



On Wed, Jul 20, 2011 at 2:24 PM, Jeff Bunting 
bunting.j...@gmail.commailto:bunting.j...@gmail.com wrote:
Thanks all.  Scott's suggestion is close and at least got me pointed in the 
right direction.  Some of the paths are too long for DIR which throws a wrench 
in the works, so I'm going to have to rely on windows search for now.

Powershell, unfortunately, currently isn't an option.

Jeff
On Wed, Jul 20, 2011 at 12:23 PM, Andrew S. Baker 
asbz...@gmail.commailto:asbz...@gmail.com wrote:
Good one, Scott.

Jeff, remember to add a % to each variable if used in a batch file, vs the 
command line.



ASB

http://about.me/Andrew.S.Baker

Harnessing the Advantages of Technology for the SMB market...



On Wed, Jul 20, 2011 at 12:13 PM, Crawford, Scott 
crawfo...@evangel.edumailto:crawfo...@evangel.edu wrote:
For /f tokens=* %i in ('dir *WORDS_TO_SEARCH* /s/a/b/ad') do robocopy /mir 
%i DESTINATION_PATH

This will search a folder tree for directorys.  Change the dir command to 
eliminate the /s if you only want to search the root.

From: Jeff Bunting 
[mailto:bunting.j...@gmail.commailto:bunting.j...@gmail.com]
Sent: Wednesday, July 20, 2011 11:01 AM

To: NT System Admin Issues
Subject: file searching and copying

I'm attempting to search for particular words in a directory name (must use 
wildcards!), and, if found, copy the the directory tree while maintaining its 
structure to another directory.

Are there any native tools (or reskit like robocopy) that can accomplish this 
somewhat easily?

thanks,
Jeff



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage 

RE: Off-topic question -- POV Daughter Card

2011-07-20 Thread Jim Holmgren
Chicken.

 

From: Daniel Rodriguez [mailto:drod...@gmail.com] 
Sent: Wednesday, July 20, 2011 4:33 PM
To: NT System Admin Issues
Subject: Re: Off-topic question -- POV Daughter Card

 

Interweb? Sounds Fasinating!

What do they taste like?

drod...@gmail.com
Sent via Dell Streak 7



CONFIDENTIALITY NOTICE: This email, including attachments, is for the sole use 
of the intended recipient(s) and may contain confidential and/or protected 
health information. Under the Federal Law (HIPAA), the intended recipient is 
obligated to keep this information secure and confidential. Any disclosure to 
third parties without authorization from the affiliate or as permitted by law 
is prohibited and punishable under Federal Law. If you are not the intended 
recipient, please contact the sender by reply e-mail and destroy all copies of 
the original message.

NOTA DE CONFIDENCIALIDAD: Este facs�mile, incluyendo lo adjunto, es para el uso 
exclusivo del destinatario(s) y puede contener informaci�n confidencial y/o 
informaci�n protegida de salud. En virtud de la Ley Federal (HIPAA), el 
destinatario tiene la obligaci�n de mantener esta informaci�n segura y 
confidencial. Cualquier divulgaci�n a terceros sin la autorizaci�n de los 
miembros de lo permitido por la ley est� prohibido y penado en virtud de la Ley 
Federal. Si usted no es el destinatario, por favor, p�ngase en contacto con el 
remitente por tel�fono y destruir todas las copias del mensaje original
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


RE: file searching and copying

2011-07-20 Thread Crawford, Scott
Ok, my last post on this todayI think :)

for /f tokens=* %i in ('dir * WORDS_TO_SEARCH * /s/ad/b') do robocopy /mir 
%i DESTINATION_PATH\%~pni

Adding the %~pni will prevent every copy from overwriting the previous. This 
will recreate your entire tree at the destination similar to Andrew's script 
below which may or may not be what you want.  You can change it to \%~ni so 
that each source directory gets copied to the root of the destination, but any 
duplicates will overwrite each other so /mir may not be the best option.

As far as paths that are too long, robocopy will handle paths up to 32,000 
characters, but the dir command is the limiting factor here. In any case, you 
should be able to see the paths that don't get copied and do those manually, 
but the others should work.

From: Crawford, Scott [mailto:crawfo...@evangel.edu]
Sent: Wednesday, July 20, 2011 6:50 PM
To: NT System Admin Issues
Subject: RE: file searching and copying

Nice to see pushd and popd making an appearance :)

Few nits and questions, just to make sure I'm not missing something:


1.   The echo in front of xcopy shouldn't be there. I'm sure it's just 
there for troubleshooting and left as an oversight. The /s /e is redundant, 
right?

2.   I'm not very practiced with the enhanced ~ substitution, but couldn't 
the SET @DIR=%%~fpv line omit the p?

3.   I think the ECHO   DEST: %@DEST%\%%~pv line has an extra \

4.   I think the xcopy's destination parameter (%@DEST%%%~pv) needs to be 
%@DEST%%%~pnv.  Without it, the files get copied into the corresponding 
parent on the destination.

5.   Is there any way to get the parentheses code blocks work from the 
command line or do they need to be inside of a .bat? I've tried stringing the 
commands together with , but met with limited success.

Possible drawback to this method:

The destination path will contain the full path of the source. For instance, if 
the source root is C:\a\b\c and it contains a folder called Search_Term, and we 
wan't the destination to be D:\, when we run the script, the destination will 
contain D:\a\b\c\Search_Term, which may not be the goal.

In the end, I don't think this is getting any better results the my original 
line. The 2NUL is just hiding the failures.

Thanks for the script though, it was fun to digest :)

From: Andrew S. Baker 
[mailto:asbz...@gmail.com]mailto:[mailto:asbz...@gmail.com]
Sent: Wednesday, July 20, 2011 3:06 PM
To: NT System Admin Issues
Subject: Re: file searching and copying

How long are the paths?

There are other ways to handle this, btw...

Try the following snippet.  It should handle long folders even if Windows 
complains about them
@echo off
 SETLOCAL ENABLEDELAYEDEXPANSION
 SET @SOURCE=%SystemDrive%
 SET @DEST=D:\SomePlace
 SET @FIND=PrivacIE

:Main
 for /f tokens=* %%v in ('dir /ad /b /s 
%@SOURCE%\*.*mailto:%25@SOURCE%25\*.* 2^NUL ^| FIND /I %@FIND%') do (
   SET @DIR=%%~fpv
   ECHO.
   ECHO SOURCE: !@DIR!
   ECHO   DEST: %@DEST%\%%~pv
   PUSHD !@DIR!
   echo XCOPY *.* %@DEST%%%~pv /S /E /R /Y
   ECHO.
   POPD
 )


:ExitBatch
 ENDLOCAL



ASB

http://about.me/Andrew.S.Baker

Harnessing the Advantages of Technology for the SMB market...


On Wed, Jul 20, 2011 at 2:24 PM, Jeff Bunting 
bunting.j...@gmail.commailto:bunting.j...@gmail.com wrote:
Thanks all.  Scott's suggestion is close and at least got me pointed in the 
right direction.  Some of the paths are too long for DIR which throws a wrench 
in the works, so I'm going to have to rely on windows search for now.

Powershell, unfortunately, currently isn't an option.

Jeff
On Wed, Jul 20, 2011 at 12:23 PM, Andrew S. Baker 
asbz...@gmail.commailto:asbz...@gmail.com wrote:
Good one, Scott.

Jeff, remember to add a % to each variable if used in a batch file, vs the 
command line.



ASB

http://about.me/Andrew.S.Baker

Harnessing the Advantages of Technology for the SMB market...


On Wed, Jul 20, 2011 at 12:13 PM, Crawford, Scott 
crawfo...@evangel.edumailto:crawfo...@evangel.edu wrote:
For /f tokens=* %i in ('dir *WORDS_TO_SEARCH* /s/a/b/ad') do robocopy /mir 
%i DESTINATION_PATH

This will search a folder tree for directorys.  Change the dir command to 
eliminate the /s if you only want to search the root.

From: Jeff Bunting 
[mailto:bunting.j...@gmail.commailto:bunting.j...@gmail.com]
Sent: Wednesday, July 20, 2011 11:01 AM

To: NT System Admin Issues
Subject: file searching and copying

I'm attempting to search for particular words in a directory name (must use 
wildcards!), and, if found, copy the the directory tree while maintaining its 
structure to another directory.

Are there any native tools (or reskit like robocopy) that can accomplish this 
somewhat easily?

thanks,
Jeff



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 

Re: Thought on malware cleaning

2011-07-20 Thread Jon Harris
Wait I thought a clue-x-four with a nail on the user side daily would help
mitigate those issues if not put a stop to them?

Jon

On Wed, Jul 20, 2011 at 11:01 AM, Ziots, Edward ezi...@lifespan.org wrote:

  Humm I sense POSTAL Epic Fail… 

 ** **

 Don’t go off the deep end Epsi, you can’t stop everything, and you can’t
 stop the users from going to bad sites or getting owned in some cases. We
 all know that technical controls don’t solve personal behavior issues. ***
 *

 ** **

 Z

 ** **

 Edward E. Ziots

 CISSP, Network +, Security +

 Security Engineer

 Lifespan Organization

 Email:ezi...@lifespan.org

 Cell:401-639-3505

 [image: CISSP_logo]

 *From:* MMF [mailto:mmfree...@ameritech.net]
 *Sent:* Tuesday, July 19, 2011 5:48 PM

 *To:* NT System Admin Issues
 *Subject:* Re: Thought on malware cleaning

  ** **

 Don’t hold back  ([image: Smile]

  

 MMF

  

 *From:* Micheal Espinola Jr michealespin...@gmail.com 

 *Sent:* Tuesday, July 19, 2011 3:15 PM

 *To:* NT System Admin Issues ntsysadmin@lyris.sunbelt-software.com 

 *Subject:* Re: Thought on malware cleaning

  

 On that note, I'm going to go on my lunch break now.  Here's what I'll do:

 I'm going to close my eyes and walk in the direction of my car.  Screw
 anything I walk into, because logically there should be doors that
 automatically open in the direction I need to go.  Screw how things
 currently exist, because I think I know how they should exist for me.
 Because I know better.  Better than anyone else.  All must bend to my will.
 And whatever people do now, they will change on the drop of a dime at my
 request.  Because user [re]education is akin to waving a magic wand.  What I
 say goes.  The world will fall in-line.

 If I bang my face into a wall along the way - screw it.  I'll just keep
 doing it until someone comes along and changes something to be how I want
 it.  Sounds perfectly reasonable...

 --
 Espi

  

  



 

 On Tue, Jul 19, 2011 at 1:01 PM, Micheal Espinola Jr 
 michealespin...@gmail.com wrote:

 Well that's f'ing helpful.  Good luck on educating the planet with a more
 logical course of action.  Let us know how that works-out for you!

 --
 Espi

  

  



 

 On Tue, Jul 19, 2011 at 12:44 PM, Ben Scott mailvor...@gmail.com wrote:*
 ***

  On Tue, Jul 19, 2011 at 3:02 PM, Micheal Espinola Jr
 michealespin...@gmail.com wrote:
  While I agree with your sentiment whole-heartedly, I still wonder why
  antimalware software isnt performing the most basic of checks for common
  infection breadcrumbs.

 Hammer myopia.

 (When all you have is a hammer, everything starts to look like a nail.)

 -- Ben


 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin

** **

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin

 ** **

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadminimage003.pngimage004.jpg

Re: non-local admin revisited

2011-07-20 Thread Jon Harris
I am with Ben on this.  $Dayjob$ has it like Andrew has it.

Jon

On Wed, Jul 20, 2011 at 12:07 AM, Ben Scott mailvor...@gmail.com wrote:

 On Tue, Jul 19, 2011 at 9:36 PM, Kennedy, Jim
 kennedy...@elyriaschools.org wrote:
  Hmmm, I like this. With UAC on there is validity to running as
  an admin all the time, IF you only have admin on your own
  machine.

   I'd still much rather be required to enter a password for privileged
 operations.  Being one click away from system privilege is scary for a
 number of reasons.

 -- Ben

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: non-local admin revisited

2011-07-20 Thread Ben Scott
On Wed, Jul 20, 2011 at 7:02 AM, Andrew S. Baker asbz...@gmail.com wrote:
  I'd still much rather be required to enter a password for privileged
 operations.  Being one click away from system privilege is scary for a
 number of reasons.

 Either way is easily faciliated depending upon one's requirements.

  Absolutely.  I was just stating my preference.  This being the
Internet, everyone is entitled to my opinion.  ;-)

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


RE: Dell Lock Code Resource

2011-07-20 Thread Mike Gill
As do I. The results of your search indicate the site I listed. The other
sites are other people asking the same question or are for beep codes and
desktops. It surprises me that this information isn't public. They provide
documentation for all their computers to allow users to disassemble them
down to the components without voiding the warranty. Why not this? Who
knows. Seems to be it would be a few less support phone calls at least.

 

-- 
Mike

 

From: Micheal Espinola Jr [mailto:michealespin...@gmail.com] 
Sent: Wednesday, July 20, 2011 3:37 PM
To: NT System Admin Issues
Subject: Re: Dell Lock Code Resource

 

I always just search online, e.g.:

http://www.google.com/search?q=dell+post+codes


It doesnt surprise me that Dell has taken a position to keep details like
this.  They are getting more and more uptight about what they consider
free support.

--
Espi

 

 





On Wed, Jul 20, 2011 at 2:21 PM, Mike Gill lis...@canbyfoursquare.com
wrote:

Does anyone have a resource for the LED Lock codes on Dell's laptops? For
example, when a laptop doesn't start up and you get the num and caps lock
LED's flashing but the scroll lock LED is solid. Dell says they don't
publish this, and I have found on older document on their website that shows
the codes, and one resource online, I would like an up to date resource that
includes Latitude's, Inspiron's and Vostro's rather than calling Dell up
every time. For example:

 

http://www.bay-wolf.com/portpostcodes.htm

 

FYI, this info isn't provided in the manual's online either.

 

-- 
Mike Gill

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: Off-topic question -- POV Daughter Card

2011-07-20 Thread Bill Humphries
Wait a second. So how does this engine of search work? You just type a 
subject into a search field and these interwebs attempt to provide 
relevant information? That sounds very helpful if you are someone who 
needs to know things that you might not inherently know.


I bet this thing takes off. Can I buy stock in this engine?

Bill


Jim Holmgren wrote:


Well…I found this cool thing online, for lack of a better term I will 
refer to it as an “Engine” that actually allows me to perform a 
“search” of the Interwebs.


-Jim

“I got yer Google right here pal…”

Jim Holmgren

Director of Technology Infrastructure

XLHealth Corporation

The Warehouse at Camden Yards

351 West Camden Street, Suite 100

Baltimore, MD 21201

410.625.2200 (main)

443.524.8573 (direct)

443-506.2400 (cell)

www.xlhealth.com http://www.xlhealth.com/

*From:* Steve Ens [mailto:stevey...@gmail.com]
*Sent:* Wednesday, July 20, 2011 3:34 PM
*To:* NT System Admin Issues
*Subject:* Re: Off-topic question -- POV Daughter Card

Jim, you didn't happen to use google or bing to check for an answer 
did you?


On Wed, Jul 20, 2011 at 2:30 PM, Jim Holmgren jholmg...@xlhealth.com 
mailto:jholmg...@xlhealth.com wrote:


http://www.ask.com/faqcentral/IBM_CARD.html#1

Promise of Value (POV) card, a 256-bit encrypted security chip
daughtercard attached to the motherboard, which enables RFID antenna, C2
tamper switch, and Alert On LAN 2 support with a compatible network
adapter. If an attempt is made to remove the POV card from the board and
install it into another system, the cryptographic key material will be
erased, rendering it unusable. This security feature is by design and
prevents the cryptographic key migration from one system to another.
Therefore, moving this security chip from one board to another is not a
supported option. If an attempt is made to move the POV card from one
system to another, it may hang on boot and display an error message
referring to an invalid machine type and serial number.



Jim Holmgren
Director of Technology Infrastructure
XLHealth Corporation
The Warehouse at Camden Yards
351 West Camden Street, Suite 100
Baltimore, MD 21201
410.625.2200 tel:410.625.2200 (main)
443.524.8573 tel:443.524.8573 (direct)
443-506.2400 tel:443-506.2400 (cell)
www.xlhealth.com http://www.xlhealth.com




-Original Message-
From: John Aldrich [mailto:jaldr...@blueridgecarpet.com 
mailto:jaldr...@blueridgecarpet.com]

Sent: Wednesday, July 20, 2011 3:15 PM
To: NT System Admin Issues
Subject: Off-topic question -- POV Daughter Card

Anyone know what a Promise of Value daughter card is? I bought some used
IBM Thinkcentre workstations and apparently the 30-pin connector on the
motherboard is for the daughter card. Anyone know what all these
daughter cards do and are they worth fussing with?



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com 
mailto:listmana...@lyris.sunbeltsoftware.com

with the body: unsubscribe ntsysadmin


CONFIDENTIALITY NOTICE: This email, including attachments, is for the 
sole use of the intended recipient(s) and may contain confidential 
and/or protected health information. Under the Federal Law (HIPAA), 
the intended recipient is obligated to keep this information secure 
and confidential. Any disclosure to third parties without 
authorization from the affiliate or as permitted by law is prohibited 
and punishable under Federal Law. If you are not the intended 
recipient, please contact the sender by reply e-mail and destroy all 
copies of the original message.


NOTA DE CONFIDENCIALIDAD: Este mensaje incluyendo cualquier anejo es 
para uso exclusivo del (los) destinatario (s) y puede incluir 
información confidencial y/o información de salud protegida. La Ley 
Federal (HIPAA) establece que el destinatario está obligado a mantener 
la información confidencial y sequra. HIPAA prohíbe y castiga 
cualquier divulgación a terceras personas sin autorización del 
afiliado o permitido por ley. Si usted no es el destinatario, redirija 
esta mensaje al remitente, y destruye cualquier copia existente del 
mensaje original. 



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin