I'm betting that on the target that at the root of the drive on which
the share resides the permissions are the install defaults, and that
probably includes Everyone:Full Control.
Check and compare the NTFS permissions at the root of both the source
and target disks.
If the NTFS permissions at
Let me know when you find your perfect market, perfect world (as you see it)
and then we will talk.
On Thursday, September 8, 2011, Kurt Buff kurt.b...@gmail.com wrote:
No, a free market doesn't presume anything about information being equally
available. Freedom != equality.
On Thu, Sep 8,
I was getting ready to invoke Godwin’s law.
Regards,
Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com
From: Mathew Shember [mailto:mathew.shem...@synopsys.com]
Sent: Friday, September 09, 2011 12:36 AM
To: NT System Admin Issues
Subject: RE: DigiNotar compromise
Ok.
If all the files are already there, I'd just reset the permissions.
Presuming the home directories are the same as usernames...
In a command prompt from the home folder
dir /ad /b userdirs.txt
for /f %f in (userdirs.txt) do cacls %f /t /e /c /r everyone
for /f %f in (userdirs.txt) do cacls %f /t
I've read the best economics texts out there, and have studied this for
years. Just for starters, I recommend the following, in order by author last
name, all of which you can find at http://www.mises.org:
Antritrust: The Case For Repeal - Dominick T. Armentano
Defending The Undefendable - Walter
I don't seek perfection. I merely see what's wrong now, and work against it.
On Fri, Sep 9, 2011 at 03:40, Jonathan Link jonathan.l...@gmail.com wrote:
Let me know when you find your perfect market, perfect world (as you see it)
and then we will talk.
On Thursday, September 8, 2011, Kurt Buff
This is just another argument about imperfect information. See my earlier
response.
On Thu, Sep 8, 2011 at 22:45, Ken Schaefer k...@adopenstatic.com wrote:
Government regulations are not necessarily anti-competitive. Property
rights are typically enforced through government regulation, as
I used /COPYALL to do the four server migrations I recently finished(32 bit
Server 2003 to 64 bit Server 2008 R2). I also did a icacls
driveletter:\path\* /save aclfile /T on the source to backup all the
permissions, then after I finished the robocopy i used icacls
20gb of email in six months, and it includes full router configs with
passwords, too.
http://www.wired.com/threatlevel/2011/09/doppelganger-domains/
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
---
To manage
LOL I figured someone would, before too long.
* *
*ASB* *http://XeeMe.com/AndrewBaker* *Harnessing the Advantages of
Technology for the SMB market…
*
On Fri, Sep 9, 2011 at 7:35 AM, Michael B. Smith mich...@smithcons.comwrote:
I was getting ready to invoke Godwin’s law.
** **
Why are internal email addresses being typed in manually?
* *
*ASB* *http://XeeMe.com/AndrewBaker* *Harnessing the Advantages of
Technology for the SMB market…
*
On Fri, Sep 9, 2011 at 10:04 AM, Kurt Buff kurt.b...@gmail.com wrote:
20gb of email in six months, and it includes full router
Who knows what evil^H^H^H^Hstupidity lurks in the minds of men?
On Fri, Sep 9, 2011 at 07:30, Andrew S. Baker asbz...@gmail.com wrote:
Why are internal email addresses being typed in manually?
* *
*ASB* *http://XeeMe.com/AndrewBaker* *Harnessing the Advantages of
Technology for the SMB
Guess it's time we had some sort of spell-checker for email address fields
that checks the recipient domain against a registered owner and alerts the
user if anything appears out of the ordinary. Or some variation of a
software restriction policy, some kind of domain recipient policy with a
Maybe those companies only use external hosted pop3/imap accounts (granted that
is unlikely).
I assume from the article is more about a company emailing another company.
I own a .org.uk domain in the UK, and I quite often get emails (which is meant
for the .org). I have even had invoices,
Aha, you are therefore a Chinese agent :-)
On 9 September 2011 15:47, Matthew B Ames matthew.a...@qinetiq.com wrote:
Maybe those companies only use external hosted pop3/imap accounts
(granted that is unlikely).
** **
I assume from the article is more about a company emailing another
No, you argue. And you have a tendency to argue yourself into a corner and
not be able to 1) get out of it or 2) acknowledge that your argument has
trapped you.
And it's not as if economics is the only area where you've done this.
On Fri, Sep 9, 2011 at 9:57 AM, Kurt Buff kurt.b...@gmail.com
do any of you have your misspelled domains registered?
Researchers’ Typosquatting Stole 20 GB of E-Mail From Fortune
500http://feeds.wired.com/~r/wired27b/~3/RtdqSVSrToQ/
just wondering.
-
Who'd you rather be, the Beatles or the Rolling Stones?
~ Finally, powerful endpoint
Shhh, best not tell my employer (who primarily does work for the UK MoD) :)
From: James Rankin [mailto:kz2...@googlemail.com]
Sent: 09 September 2011 16:07
To: NT System Admin Issues
Subject: Re: External subdomains considered dangerous?
Aha, you are therefore a Chinese agent :-)
On 9 September
I have been asked to speak to an group regarding personal internet security.
This will be a fairly light weight discussion and I have a couple of really
good references regarding choosing secure passwords and the
https://www.grc.com/haystack.htm site for testing.
My question for all of you
Irrelevent. The tools used for brute forcing passwords just use the whole
character set anyhow.
Ben M. Schorr
Roland Schorr Tower
www.rolandschorr.com | www.officeforlawyers.com | Twitter: @bschorr
From: Shauna Hensala [mailto:she...@msn.com]
Sent: Friday, September 09, 2011 9:32
To:
How do you all deal with ad-hoc internal file transfers?
We have an Accellion for external, and if needed, internal transfers, but I'm
wondering if there are any slightly more elegant alternatives to a Transfer
folder with a folder on it for every member of staff that is r/w by them, and
IMO, the most important thing that people need to know about passwords
follows.
DON'T RECYLCE PASSWORDS.
On Fri, Sep 9, 2011 at 12:32 PM, Shauna Hensala she...@msn.com wrote:
I have been asked to speak to an group regarding personal internet
security. This will be a fairly light weight
2011/9/9 Paul Hutchings paul.hutchi...@mira.co.uk:
How do you all deal with ad-hoc internal file transfers?
We have an Accellion for external, and if needed, internal transfers, but
I'm wondering if there are any slightly more elegant alternatives to a
Transfer folder with a folder on it for
Back in the day, L0pht would be completely ineffectual against such a password,
even if you included said character in its character set. I emailed L0pht at
the time and they said they didn't support cracking alt-char passwords. I've
heard that this is not the case with other password
Considering it sounds like you're talking to individuals about Internet
security for their personal things, I'd suggest pointing them to LastPass.
Free, makes life much easier for web site credentials, and lots of docs/advice
for n00bs.
DAMIEN SOLODOW
Systems Engineer
317.447.6033 (office)
...SNOrt...*yawn*
Huh... whasgoingonhere?
-sc
-Original Message-
From: Ben Scott [mailto:mailvor...@gmail.com]
Sent: Thursday, September 08, 2011 7:52 PM
To: NT System Admin Issues
Subject: Re: DigiNotar compromise
On Thu, Sep 8, 2011 at 6:28 PM, Kurt Buff
On Fri, Sep 9, 2011 at 12:32 PM, Shauna Hensala she...@msn.com wrote:
I have been asked to speak to an group regarding personal internet security.
This will be a fairly light weight discussion and I have a couple of really
good references regarding choosing secure passwords
The best rules
Such as forum-jockeys making unsupported assertions?
-sc
-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com]
Sent: Friday, September 09, 2011 9:58 AM
To: NT System Admin Issues
Subject: Re: DigiNotar compromise
I don't seek perfection. I merely see what's wrong now,
On Fri, Sep 9, 2011 at 1:59 PM, Crawford, Scott crawfo...@evangel.edu wrote:
There’s a quite dated, yet relevant, article at sysopt about some of my
findings at http://www.sysopt.com/tutorials/article.php/3532756.
Scott: That entire analysis is based on the scenario where you have
an NTLM
Trying to get this to work it seems that 1 of my DC's is not talking to
the other 2.
Windows 2003 domain.
FRS is failing when I run dcdiag???
This e-mail and any files transmitted with it are property of Indiana Members
Credit Union, are confidential, and are intended solely for the use
Speaking of the grid outage here's a site that shows San Diego's skyline
before and during the outage.
On Fri, Sep 9, 2011 at 11:15 AM, Free, Bob r...@pge.com wrote:
http://arstechnica.com/microsoft/news/2011/09/microsoft-posts-security-bulletins-four-days-early-scrambles-to-fix-mistake.ars
As relevant as ever - http://kb.ultratech-llc.com/~moreinfo.txt
From: itli...@imcu.com [mailto:itli...@imcu.com]
Sent: Friday, September 09, 2011 11:17 AM
To: NT System Admin Issues
Subject: WSUS 3 sp2
Trying to get this to work it seems that 1 of my DC's is not talking to the
other 2.
Windows
Not to mention alt characters are a major pain (or non existent) on some
devices.
John W. Cook
Systems Administrator
Partnership for Strong Families
From: Crawford, Scott crawfo...@evangel.edu
To: NT System Admin Issues ntsysadmin@lyris.sunbelt-software.com
Sent:
Oops, here's the link http://thedailywh.at/2011/09/09/tgif-of-the-day/
On Fri, Sep 9, 2011 at 11:22 AM, Mike Sullivan neog...@gmail.com wrote:
Speaking of the grid outage here's a site that shows San Diego's skyline
before and during the outage.
On Fri, Sep 9, 2011 at 11:15 AM, Free, Bob
Hi All,
To those who do use WDS, how do you have the networking portion of it
configured? Is it on the same VLAN as production or a separate
deployment VLAN? I ask because I want to make sure when I have a downed
workstation or server, it will not come back up and pxe boot and all of
a
Someones weekend got off to a bad start. I will admit, I've on ocassion had
one of those days myself though. Fortunatly most were of a much smaller
scale.
On Fri, Sep 9, 2011 at 11:15 AM, Free, Bob r...@pge.com wrote:
I think this is relevant here:
http://unrforliberty.com/wp-content/uploads/2011/02/Our-Discussion.jpg
- WJR
On Fri, Sep 9, 2011 at 10:25, Jonathan Link jonathan.l...@gmail.com wrote:
No, you argue. And you have a tendency to argue yourself into a corner and
not be able to 1) get out of it
I have customers that do it both ways.
Except in a desktop transformation scenario, I recommend the use of a separate
deployment LAN; and there are lots of reasons for this...
Regards,
Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com
From: Jimmy Tran
Umm, actually it was mentioned. ☺ Paragraph 2.
From: John Cook [mailto:john.c...@pfsf.org]
Sent: Friday, September 09, 2011 1:23 PM
To: NT System Admin Issues
Subject: Re: password questions
Not to mention alt characters are a major pain (or non existent) on some
devices.
John W. Cook
Systems
8675309 kinds of awesome.
-sc
From: William Robbins [mailto:dangerw...@gmail.com]
Sent: Friday, September 09, 2011 2:32 PM
To: NT System Admin Issues
Subject: Re: DigiNotar compromise
I think this is relevant here:
http://unrforliberty.com/wp-content/uploads/2011/02/Our-Discussion.jpg
I find it useful to have a few levels of passwords, based on the potential
damage that could ensue as a result of compromise of that account. For
financial sites, I use a passphrase with a variable character so that each
password at the top level is unique.
This needs constant review, though.
Ok, I'll try the VLAN option and see how that goes.
From: Michael B. Smith [mailto:mich...@smithcons.com]
Sent: Friday, September 09, 2011 11:33 AM
To: NT System Admin Issues
Subject: RE: WDS Setup
I have customers that do it both ways.
Except in a desktop transformation scenario, I
So, are you saying I cheated?
On Fri, Sep 9, 2011 at 2:32 PM, William Robbins dangerw...@gmail.comwrote:
I think this is relevant here:
http://unrforliberty.com/wp-content/uploads/2011/02/Our-Discussion.jpg
- WJR
On Fri, Sep 9, 2011 at 10:25, Jonathan Link jonathan.l...@gmail.comwrote:
I agree, its limited. I pointed out that its old and only included it as a
reference to alt-chars not being created equal. If you're going to use an
alt-char, you might as well pick a good one.
However, the point remains that incorporating an alt-char vastly increases the
brute-force space and
I provide information, not accusation. ;)
- WJR
On Fri, Sep 9, 2011 at 13:46, Jonathan Link jonathan.l...@gmail.com wrote:
So, are you saying I cheated?
On Fri, Sep 9, 2011 at 2:32 PM, William Robbins dangerw...@gmail.comwrote:
I think this is relevant here:
Too bad rational human beings don't exist.
From: William Robbins [mailto:dangerw...@gmail.com]
Sent: Friday, September 09, 2011 1:32 PM
To: NT System Admin Issues
Subject: Re: DigiNotar compromise
I think this is relevant here:
Reminds me of my childhood days in the 1950's. The soap opera, The Edge
of Night, showed a skyline being blacked out during the theme music.
==
richard
Mike Sullivan neog...@gmail.com wrote on 09/09/2011 01:24:19 PM:
Mike Sullivan neog...@gmail.com
09/09/2011 01:25 PM
Please respond to
Sorry, friggin Blackberry truncated the message, didn't see that. So that's a +1
John W. Cook
Systems Administrator
Partnership for Strong Families
From: Crawford, Scott crawfo...@evangel.edu
To: NT System Admin Issues ntsysadmin@lyris.sunbelt-software.com
Sent:
+ some random rational number.
* *
*ASB* *http://XeeMe.com/AndrewBaker* *Harnessing the Advantages of
Technology for the SMB market…
*
On Fri, Sep 9, 2011 at 2:41 PM, Steven M. Caesare scaes...@caesare.comwrote:
8675309 kinds of awesome.
** **
-sc
** **
*From:* William
It sounds like you haven't configured the client to actually use RDP over HTTPS.
Open the RDP client. If the tabs for General, Display, etc. are not
showing, click options. Go to the advanced tab and click settings in
the connect from anywhere section. Tick the radio button for use
these RD
Might wanna restrict that to whole numbers or even counting numbers. Rational
includes negatives :)
From: Andrew S. Baker [mailto:asbz...@gmail.com]
Sent: Friday, September 09, 2011 2:38 PM
To: NT System Admin Issues
Subject: Re: DigiNotar compromise
+ some random rational number.
ASB
2011/9/9 Crawford, Scott crawfo...@evangel.edu:
However, the point remains that incorporating an alt-char vastly increases the
brute-force space and therefore makes them harder to crack no matter
how you're attempting to crack it.
Even that's not the case, if rainbow tables are an option.
Hi Richard,
Under the advanced tab I have selected use these RD Gateway server settings
The server name matches the common name in the certificate I
purchased/installed on the server. It's a standard SSL cert (no wildcard).
Logon method (ask for password NTLM)
Bypass RD Gateway server for local
The one you want to connect to.
On Fri, Sep 9, 2011 at 5:17 PM, Neil Standley n...@net-venture.com wrote:
Hi Richard,
Under the advanced tab I have selected use these RD Gateway server settings
The server name matches the common name in the certificate I
purchased/installed on the server.
I don't think that's true. Point me to a rainbow table that has that large of
a keyspace. I can't say I've looked exhaustively, but I've not been able to
find one that even exhausts the entire ascii space, let alone Unicode.
-Original Message-
From: Ben Scott
What I tell the lay person
1. Mix up the password with uppercase, lowercase, numbers and special
characters. Take a current password and mix a couple characters. For
example, if your current password is abracadabra, then change it to
something like abRac@dabra. Something easy to
Dang those Chinese...
--
Espi
On Fri, Sep 9, 2011 at 8:31 AM, S Powell powe...@gmail.com wrote:
do any of you have your misspelled domains registered?
Researchers’ Typosquatting Stole 20 GB of E-Mail From Fortune
500http://feeds.wired.com/%7Er/wired27b/%7E3/RtdqSVSrToQ/
just
Excellent summary. This.
--
Espi
On Fri, Sep 9, 2011 at 10:59 AM, Crawford, Scott crawfo...@evangel.eduwrote:
Back in the day, L0pht would be completely ineffectual against such a
password, even if you included said character in its character set. I
emailed L0pht at the time and they
I will only add that i try to get my clients to use passphrases like I have
a son that is 23 tomorrow or something they will remember but I rarely can
get them to use one that long though to be honest they usually end up more
like son is 23 easy to know if you know the person and easier to crack.
That was it. Once I had the TS Gateway info entered under the advanced tab all
I needed was to enter the name of the PC I wanted to connect to via the general
tab.
Sometimes what should be obvious is the hardest thing to see.
Thanks much Richard!
Neil
-Original Message-
From:
You're most welcome. I'm happy to have been able to point you in the
right direction.
On Fri, Sep 9, 2011 at 7:24 PM, Neil Standley n...@net-venture.com wrote:
That was it. Once I had the TS Gateway info entered under the advanced tab
all I needed was to enter the name of the PC I wanted to
On Fri, Sep 9, 2011 at 6:02 PM, Crawford, Scott crawfo...@evangel.edu wrote:
I don't think that's true. Point me to a rainbow table that has that large
of a
keyspace. I can't say I've looked exhaustively, but I've not been able to
find one that even exhausts the entire ascii space, let
On Fri, Sep 9, 2011 at 6:12 PM, Jacob ja...@excaliburfilms.com wrote:
1. Mix up the password with uppercase, lowercase, numbers and special
characters.
It is arguably more effective to use a longer password with a
simpler scheme than a shorter password with a complicated scheme.
They yield
63 matches
Mail list logo