Technology for Business Advantage...
On Sat, Nov 20, 2010 at 2:39 PM, Crawford, Scott
crawfo...@evangel.edumailto:crawfo...@evangel.edu wrote:
I've kinda been forcing myself to use setacl in new scripts because it can
target registry entries among other things. But, I figure the more I use
reason indeed. I haven't had to work with such apps in quite some
time. Thankfully. :)
-ASB: http://XeeSM.com/AndrewBaker
Sent from my Motorola Droid
On Nov 21, 2010 1:33 AM, Crawford, Scott
crawfo...@evangel.edumailto:crawfo...@evangel.edu wrote:
~ Finally, powerful endpoint security that ISN'T
Any possibility that you had the user settings disabled on the GPO? If so, the
user wont apply them even though the GPO only applies to a computer.
From: Paul Hutchings [mailto:paul.hutchi...@mira.co.uk]
Sent: Wednesday, November 24, 2010 5:45 AM
To: NT System Admin Issues
Subject: RE: GPO
Old hard drives can be mildly entertaining to watch work with the lid off. I'm
sure they'll go fairly quick, but I've read and written 5GB without a top once.
Also fun to scratch the platter on a running drive. And don't get me started
on the fun magnets.
-Original Message-
From:
Yeah, Jeffery doesn't like it when we kill the listserv.
-Original Message-
From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: Monday, January 10, 2011 1:30 PM
To: NT System Admin Issues
Subject: RE: domain controller in the cloud???
If you would like this slide deck ( so as not to
The biggest part of this question is enumerating all the possible directories
that exist. Is this on a single server? Once you have a list of the possible
candidates, the tools that others have mentioned will be able to check for your
group.
-Original Message-
From: Joseph Heaton
Try:
FileACL D:\ /batch | find /i GROUPNAME_HERE
Won't be the prettiest output, but should show you every path that specific
group has permissions to.
-Original Message-
From: Joseph Heaton [mailto:jhea...@dfg.ca.gov]
Sent: Tuesday, January 11, 2011 12:59 PM
To: NT System Admin Issues
on the server in question, including the quotes around the
group name, and it just went to the next line, with a command prompt. There
was no output. I know that this group has permissions on the drive I'm looking
at.
Crawford, Scott crawfo...@evangel.edu 1/11/2011 11:02 AM
Try:
FileACL D:\ /batch
OWA 2003 would let you reset expired passwords, but 2007 and 2010 didnt get
that functionality until SP3 and SP1 respectively.
From: Andrew S. Baker [asbz...@gmail.com]
Sent: Tuesday, January 11, 2011 6:20 PM
To: NT System Admin Issues
Subject: Re: RE: domain
You can edit an existing GPO to point to a new .msi.
Make sure to check Uninstall this application when it falls out of the scope
of management when you're deploy a package. Then when you're done with it,
you can right click the package from within the GPO, All Tasks, Remove,
Immediately
Here's my notes on building a java deploy
Download 32 bit Offline version at:
http://www.java.com/en/download/manual.jsp
Copy MSI and Data1.cab from:
%userprofile%\Application Data\Sun\Java
Create MST by editing the following:
Property
From my notes:
Download 32 bit Offline version at:
http://www.java.com/en/download/manual.jsp
Copy MSI and Data1.cab from:
%userprofile%\Application Data\Sun\Java
Create MST by editing the following:
Property
AUTOUPDATECHECK = 0
Unless you're going to white-list every doc/jpg/pdf/mp3 you're going to open,
that's not a panacea either. Documents = 1's and 0's = code. The only
difference is what layer its executed at. Assume you white-list
AdobeReader.exe. The next time a flaw is found that is exploited through a
at the moment...
ASB (My Bio via About.Mehttp://about.me/Andrew.S.Baker/bio)
Exploiting Technology for Business Advantage...
On Wed, Jan 26, 2011 at 2:51 PM, Crawford, Scott
crawfo...@evangel.edumailto:crawfo...@evangel.edu wrote:
Unless you're going to white-list every doc/jpg/pdf/mp3 you're
1. The difference between 32 bit and 64 bit Java correlates to which
version your browser supports. Lots of plugins don't have a 64 bit version so
we've basically chosen to ignore IE 64 and only push 32 bit plugins to all
machines regardless of whether the OS is 32 or 64 bit. You could
To: NT System Admin Issues
Subject: Re: GP software deployment best practices
On Fri, Jan 28, 2011 at 3:53 PM, Crawford, Scott crawfo...@evangel.edu wrote:
How much RAM does a browser need to access anyway?
I've had Firefox over 1 GB under normal conditions. Granted, I
had over 100 tabs open
Any idea how much of the file was copied? You can see the offset that's being
read and written with ProcMon. That will let you know how far into the file it
is, which might lend a clue.
From: itli...@imcu.com [mailto:itli...@imcu.com]
Sent: Monday, January 31, 2011 8:31 AM
To: NT System Admin
RichCopy's an option too. Is it possible that the drive is damaged?
From: itli...@imcu.com [mailto:itli...@imcu.com]
Sent: Monday, January 31, 2011 8:52 AM
To: NT System Admin Issues
Subject: RE: Copying large file
Xcopy
From: Haritwal, Dhiraj [mailto:dhiraj.harit...@ap.sony.com]
Posted At:
Technology for Business Advantage...
On Wed, Jan 26, 2011 at 5:03 PM, Crawford, Scott
crawfo...@evangel.edumailto:crawfo...@evangel.edu wrote:
My point is that neither signatures, nor white-listing are a panacea. The fact
that we've been sig based for so long while malware continues to be effective
. Not the same USB drive and not the
same file. Just large files? I have read a bunch of KB's and they all go in
different directions.
From: Crawford, Scott [mailto:crawfo...@evangel.edu]
Posted At: Monday, January 31, 2011 11:21 AM
Posted To: itli...@imcu.com
Conversation
online via About.Mehttp://about.me/Andrew.S.Baker/bio)
Exploiting Technology for Business Advantage...
On Mon, Jan 31, 2011 at 12:48 PM, Crawford, Scott
crawfo...@evangel.edumailto:crawfo...@evangel.edu wrote:
No one here has suggested panacea
Perhaps not, but that's not my perception. I see lots
/Andrew.S.Baker/bio)
Exploiting Technology for Business Advantage...
On Mon, Jan 31, 2011 at 2:36 PM, Crawford, Scott
crawfo...@evangel.edumailto:crawfo...@evangel.edu wrote:
Application whitelisting is a good idea, because for every environment, there
are less items that fall into the known
to choose, I'd take whitelisting over blacklisting every damned
day.
Kurt
On Mon, Jan 31, 2011 at 16:12, Crawford, Scott
crawfo...@evangel.edumailto:crawfo...@evangel.edu wrote:
Inline, but here’s some opening comments :)
White-listing .exes does nothing to stop attacks like .wmf and .jpg
Set it in Outlook to SecretAttributeNobodyCanFind. Then:
adfind -f cn=user,ou=orgunit,dc=domain,dc=org | find /i
SecretAttributeNobodyCanFind
That will show you the attribute name its stored in...assuming its not encoded
in some weird format.
From: David Lum [mailto:david@nwea.org]
Sent:
physicalDeliveryOfficeName
btw, I meant:
adfind -f distinguishedname=cn=user,ou=orgunit,dc=domain,dc=org | find /i
SecretAttributeNobodyCanFind
From: Crawford, Scott [mailto:crawfo...@evangel.edu]
Sent: Thursday, February 03, 2011 2:34 PM
To: NT System Admin Issues
Subject: RE: ADMOD question
Credit is also due to you for not leaving them high and dry...pun
intended...but actually sticking it out and working through what was
undoubtedly one of the toughest times there.
From: Jonathan Link [mailto:jonathan.l...@gmail.com]
Sent: Thursday, February 03, 2011 4:45 PM
To: NT System Admin
out of curiosity, how many computers does that serve?
From: Kramer, Jack [jack.kra...@ur.msu.edu]
Sent: Friday, February 04, 2011 8:13 AM
To: NT System Admin Issues
Subject: Re: [semi-OT] Last IPv4 address blocks assigned
The nice thing about being at a
:
50
-Original Message-
From: Crawford, Scott
[mailto:crawfo...@evangel.edumailto:crawfo...@evangel.edu]
Sent: Friday, February 04, 2011 6:55 AM
To: NT System Admin Issues
Subject: RE: [semi-OT] Last IPv4 address blocks assigned
out of curiosity, how many computers does that serve
that it wasn't as perhaps controlled as it could have been.
From: Crawford, Scott [mailto:crawfo...@evangel.edu]
Sent: Tuesday, 8 February 2011 8:13 AM
To: NT System Admin Issues
Subject: RE: [semi-OT] Last IPv4 address blocks assigned
I only skim the NANOG (North American Network Operators Group
1 - Heed Ben's advice about avoiding Deny if at all possible. Much chaos can
ensue.
Yeah, the last thing you want to do is get into a black-list permissions model
;)
From: Andrew S. Baker [mailto:asbz...@gmail.com]
Sent: Monday, February 07, 2011 5:14 PM
To: NT System Admin Issues
Subject:
Your bing string is csc recover.
If you have the C:\Windows\CSC folder in tact, you should be able to extract
the files using csccmd.exe.
From: John Cook [mailto:john.c...@pfsf.org]
Sent: Wednesday, February 09, 2011 10:45 AM
To: NT System Admin Issues
Subject: Recovering offline files
Short
What character set are you looking at here? Assuming the 256 ASCII chars,
you're looking at 256^14 or 5.19 x 10^33 passwords. At 14 chars each, it will
take, you're looking at 67699845898419233783545856 GB just to store the
passwords uncompressed. In order to get the list of passwords to fit in
to use those
credentials in another scenario.
E.g. I have an NTLM hash. But I need to get a Kerberos ticket, or I need to
logon interactively, or a I need to logon to a non-Windows system where the
credentials are synchronised. Etc.
Cheers
Ken
From: Crawford, Scott [mailto:crawfo
About.Mehttp://about.me/Andrew.S.Baker/bio)
Exploiting Technology for Business Advantage...
On Fri, Feb 11, 2011 at 2:57 AM, Crawford, Scott
crawfo...@evangel.edumailto:crawfo...@evangel.edu wrote:
What character set are you looking at here? Assuming the 256 ASCII chars,
you're looking at 256^14
]
Sent: Friday, February 11, 2011 9:02 AM
To: NT System Admin Issues
Subject: Re: IPhone attack reveals passwords in six minutes
On Fri, Feb 11, 2011 at 2:57 AM, Crawford, Scott crawfo...@evangel.edu wrote:
What character set are you looking at here? Assuming the 256 ASCII chars ...
There aren't
Fun and interesting read. Thanks.
From: Jonathan Link [mailto:jonathan.l...@gmail.com]
Sent: Thursday, February 17, 2011 10:31 AM
To: NT System Admin Issues
Subject: SQl Injection, Rainbow Tables, Social Engineering, oh my!
Further detail of the HBGary comeuppance, beat down, or substitute your
I'm a pretty firm believer in pushing these things through group policy. That
way, there isn't a time when the computer is fully booted and logged into that
its possibly missing AV. Waiting for Sophos or Vipre to push itself leaves you
potentially exposed for the interval between scans.
From:
ditto
From: John Hornbuckle [john.hornbuc...@taylor.k12.fl.us]
Sent: Friday, February 18, 2011 8:06 AM
To: NT System Admin Issues
Subject: RE: How do you deploy AV?
We use Microsoft’s Forefront Client Security. It’s pushed down and updated via
WSUS. No muss, no
Admin Issues
Subject: RE: How do you deploy AV?
How does the licensing costs of FCS compare to Vipre, do you know?
BF
From: Crawford, Scott [mailto:crawfo...@evangel.edu]
Sent: Friday, February 18, 2011 10:59 AM
To: NT System Admin Issues
Subject: RE: How do you deploy AV?
ditto
Oh come on. We're nerds. Details are interesting.
From: John Hornbuckle [mailto:john.hornbuc...@taylor.k12.fl.us]
Sent: Friday, February 18, 2011 12:48 PM
To: NT System Admin Issues
Subject: RE: OT: Windows XP Mode Question
It's basically a configuration thing within the software. If you're
If you're disconnected from the LAN, you'll still get updates direct from MS
over the internet.
Note the Check for updates on Microsoft Update when WSUS is unavailable
option on the Advanced tab of the policy editor.
From: John Hornbuckle [mailto:john.hornbuc...@taylor.k12.fl.us]
Sent: Friday,
vetted them.
From: Crawford, Scott [mailto:crawfo...@evangel.edu]
Sent: Friday, February 18, 2011 2:01 PM
To: NT System Admin Issues
Subject: RE: How do you deploy AV?
If you're disconnected from the LAN, you'll still get updates direct from MS
over the internet.
Note the Check for updates
the licensing costs of FCS compare to Vipre, do you know?
BF
From: Crawford, Scott [mailto:crawfo...@evangel.edu]
Sent: Friday, February 18, 2011 10:59 AM
To: NT System Admin Issues
Subject: RE: How do you deploy AV?
ditto
From: John Hornbuckle
=HCSB
:-)
Regards,
Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com
-Original Message-
From: Crawford, Scott [mailto:crawfo...@evangel.edu]
Sent: Friday, February 18, 2011 3:12 PM
To: NT System Admin Issues
Subject: RE: How do you deploy AV?
I wouldn't take
I'm not familiar with %work%. Why do you surround it with percent signs?
From: Andrew S. Baker [mailto:asbz...@gmail.com]
Sent: Monday, February 21, 2011 9:54 AM
To: NT System Admin Issues
Subject: Re: RE: RE: Windows 2008 R2 - Default NTFS Permissions on new drive
Yes, we most certainly are.
Subject: Re: RE: RE: Windows 2008 R2 - Default NTFS Permissions on new drive
Expandable environment variable reference - basically it is populated with
whatever your current job is
On 21 February 2011 16:57, Crawford, Scott
crawfo...@evangel.edumailto:crawfo...@evangel.edu wrote:
I'm not familiar
Not quite. You can create a separate process with explorer /separate. This
works great in XP with runas for creating an explorer window under a different
security context. It still works in Vista/7/2K8 to create a separate process,
but it still gets created without admin group in the token.
Counter? The battery physically degrades over time. If you're seeing decreased
run time, the solution is a new battery.
-Original Message-
From: John Aldrich [mailto:jaldr...@blueridgecarpet.com]
Sent: Monday, February 21, 2011 12:39 PM
To: NT System Admin Issues
Subject: RE: Dell
Are you needing more than Start/Windows Security gives you?
From: Kevin Lundy [mailto:klu...@gmail.com]
Sent: Monday, February 21, 2011 1:26 PM
To: NT System Admin Issues
Subject: Re: double hop RDP
Success. That worked with the ctrl-alt-end combination. Thanks.
Yes, Eric you are right, this
Yeah, UAC and Explorer is a major pain. It's basically completely broken. Just
like the OP, I have drives permissioned with only Administrators:F and
System:F. When opening that drive, one would expect to get a UAC prompt, but
none is to be found.
I recently came across
Dir /ad will return only directories.
I agree - the For /F option is ideal here. If you want something a little more
permanent, create a batch file with
---robo.bat
For /F %%i in (DirectoriesToCopy.txt) do robocopy /mir %%i %1
---robo.bat
To use it, run dir /ad/b
right up - subsecond. Explorer++ takes a couple of
second - and I hate that. :-P
Regards,
Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com
From: Crawford, Scott [mailto:crawfo...@evangel.edu]
Sent: Monday, February 21, 2011 3:28 PM
To: NT System Admin Issues
Subject: RE
-windows-explorer.html
Carl
From: Crawford, Scott [mailto:crawfo...@evangel.edu]
Sent: Monday, February 21, 2011 1:24 PM
To: NT System Admin Issues
Subject: RE: Windows 2008 R2 - Default NTFS Permissions on new drive
Not quite. You can create a separate process with “explorer
: Monday, February 21, 2011 9:52 PM
To: NT System Admin Issues
Subject: Re: Windows 2008 R2 - Default NTFS Permissions on new drive
Just kill explorer once - as soon as you log in. :)
On Mon, Feb 21, 2011 at 18:17, Crawford, Scott crawfo...@evangel.edu wrote:
Yeah, that definitely works, but killing
:)
explorer .
If the cd /d worked, then the explorer . should also work and is now showing
you the drive contents.
If the cd /d failed, then either your cmd prompt is not elevated or there are
other issues with that drive.
Carl
-Original Message-
From: Crawford, Scott [mailto:crawfo
Message-
From: Crawford, Scott [mailto:crawfo...@evangel.edu]
Sent: Tuesday, February 22, 2011 4:20 PM
To: NT System Admin Issues
Subject: RE: Windows 2008 R2 - Default NTFS Permissions on new drive
Yeah, the cmd is elevated as demonstrated by your test, but explorer isn’t.
Have you tried
- as soon as you log in. :)
On Mon, Feb 21, 2011 at 18:17, Crawford, Scott crawfo...@evangel.edu wrote:
Yeah, that definitely works, but killing explorer every time you want to
switch contexts gets tedious. You can kill it with task manager too for the
same effect.
Sent from my Palm Pre on the Now
As I understand, when going through Windows Update, it doesn't have to download
the bits that you may already have as part of previous patches. So, the more up
to date you are, the smaller the download for SP1.
From: Michael B. Smith [mailto:mich...@smithcons.com]
Sent: Tuesday, February 22,
Cmon mon; that's uncalled for.
Sent from my Palm Pre on the Now Network from Sprint
On Feb 23, 2011 7:41 PM, Gary Slinger gary.slin...@gmail.com wrote:
It absolutely blows my mind that someone employs you in any technical fashion
whatsoever.
-Original
You may have missed the thread earlier about explorer and UAC. If so, let me
sum up:
Explorer and UAC is broken :)
I don't want to miss a solution you may have so let me restate my test case:
Create a drive permissioned at the root with ONLY Adminstrator:F and System:F
Try and open said drive
Press control what? :)
Just saw this WP7 is coming to Sprint
http://www.ppcgeeks.com/2010/10/11/new-wp7-device-coming-to-sprint-soon-hct-7-pro/
From: John Hornbuckle [mailto:john.hornbuc...@taylor.k12.fl.us]
Sent: Thursday, February 24, 2011 12:06 PM
To: NT System Admin Issues
Subject: RE: Can
The -d switch on psexec causes it to run non-interactively so you could start
the process on a bunch of machines at once.
My preferred method by far is with group policy though. What seems heavy handed
about it? The beauty is that you just apply it once and you're done. If you add
a new
You can also wrap a legacy install inside of an MSI. That would allow you to do
your command line install with GPO.
-Original Message-
From: Bob Fronk [mailto:b...@btrfronk.com]
Sent: Friday, February 25, 2011 12:30 PM
To: NT System Admin Issues
Subject: RE: MSI deployment software
installation/scripting technology can do that.
SMS Installer will do that…
http://myitforum.com/cs2/files/folders/sms2003/entry125224.aspx
From: Harry Singh [mailto:hbo...@gmail.commailto:hbo...@gmail.com]
Sent: Friday, February 25, 2011 1:55 PM
To: NT System Admin Issues
Cc: Crawford, Scott
But SPs can?
From: Eric Wittersheim [mailto:eric.wittersh...@gmail.com]
Sent: Saturday, February 26, 2011 10:01 AM
To: NT System Admin Issues
Subject: Re: WSUS no seeing W7 SP1
Hot fixes can't be entered into the catalog.
On Feb 26, 2011 9:39 AM, Crawford, Scott
crawfo
From: Crawford, Scott crawfo...@evangel.edu
To: NT System Admin Issues ntsysadmin@lyris.sunbelt-software.com
Sent: Sat Feb 26 15:24:56 2011
Subject: RE: WSUS no seeing W7 SP1
But SPs can?
From: Eric Wittersheim [mailto:eric.wittersh...@gmail.com]
Sent: Saturday, February 26, 2011 10
.
-Original Message-
From: Ben Scott [mailto:mailvor...@gmail.com]
Sent: Monday, February 28, 2011 12:37 PM
To: NT System Admin Issues
Subject: Re: eSATA PCI-E card
On Mon, Feb 28, 2011 at 1:27 PM, Crawford, Scott crawfo...@evangel.edu wrote:
Any recommendations for brands? I'm looking
Yeah, disabling logon locally works and doesn't interfere with RDP.
You'll also need to deny rights to access the computer from the network and
specify the server in the Log On To box.
This sounds like a good place to start to take care of normal use. But, the
whole scenario sounds like a bad
I think you're gonna have a hard time identifying all the holes, if its
possible at all. Giving a user DA creds just seems dangerous.
From: Carl Houseman [mailto:c.house...@gmail.com]
Sent: Tuesday, March 01, 2011 5:15 PM
To: NT System Admin Issues
Subject: RE: Limit user to running one script
Keep in mind that if you can decipher this, it will only return the values for
the current user. You'll need to enumerate all the profiles on the machine and
inspect this key in each profile.
From: Sam Cayze [mailto:sca...@gmail.com]
Sent: Thursday, March 03, 2011 2:16 PM
To: NT System Admin
Instead of MyDC, you can use domain.comhttp://domain.com to eliminate the
always the same DC problem. You can also use %logonserver%.
I'm not sure why you're mapping at all. Can't you just call
\\MyDC\Netlogon\usefulexecutable.exe?
Finally, do you only want outlookplaceholder.cmd as a flag
Also check out http://www.krollontrack.com/software/powercontrols/ There's a
free trial and depending on your goal, you'll be able to read anything it finds
in the file...just not export it.
-Original Message-
From: Bill Humphries [mailto:nt...@hedgedigger.com]
Sent: Thursday, March
Wow. They can't come up with anything better for you to do than this? :)
I would just tell management that it's not realistically possible and rather
pointless anyway.
One option might be Process Explorer. Obviously it has WAY more UI than task
manager, but it *might* have some option for
++
From: John Hornbuckle [mailto:john.hornbuc...@taylor.k12.fl.us]
Sent: Friday, March 11, 2011 10:48 AM
To: NT System Admin Issues
Subject: RE: Antivirus Vendor Replacement
We're happy Forefront users here. Easy to deploy and update via WSUS, if you
already have WSUS in place.
John
All you're out is the time...which can be considerable if you have a lot of
bad sectors on the drive. I once ran it for over a week and it was still stuck
trying to read the first block/sector - whatever each individual icon
represents.
-Original Message-
From: Angus Scott-Fleming
Sounds like they need a good whitelisting solution ;)
Feed: Schneier on Security
Posted on: Wednesday, March 16, 2011 6:14 AM
Author: schneier
Subject: Hacking Cars with MP3 Files
Impressive
researchhttp://www.itworld.com/security/139794/with-hacking-music-can-take-control-your-car:
By adding
16, 2011 at 1:44 PM, Crawford, Scott
crawfo...@evangel.edumailto:crawfo...@evangel.edu wrote:
Sounds like they need a good whitelisting solution ;)
Feed: Schneier on Security
Posted on: Wednesday, March 16, 2011 6:14 AM
Author: schneier
Subject: Hacking Cars with MP3 Files
Impressive
Buff
kurt.b...@gmail.commailto:kurt.b...@gmail.com wrote:
Sounds like poor system design.
What reason on Earth justified tying the music player to the vehicle
control systems?
Kurt
On Wed, Mar 16, 2011 at 10:44, Crawford, Scott
crawfo...@evangel.edumailto:crawfo...@evangel.edu wrote:
Sounds
system design.
What reason on Earth justified tying the music player to the vehicle
control systems?
Kurt
On Wed, Mar 16, 2011 at 10:44, Crawford, Scott
crawfo...@evangel.edumailto:crawfo...@evangel.edu wrote:
Sounds like they need a good whitelisting solution ;)
Feed: Schneier on Security
I'm here to serve :)
From: Jeff Steward [mailto:jstew...@gmail.com]
Sent: Wednesday, March 16, 2011 5:25 PM
To: NT System Admin Issues
Subject: Re: FW: Hacking Cars with MP3 Files
That actually made me laugh out loud...
-Jeff Steward
On Wed, Mar 16, 2011 at 5:46 PM, Crawford, Scott
crawfo
I thought we were an autonomous collective.
From: John Cook [mailto:john.c...@pfsf.org]
Sent: Thursday, March 17, 2011 1:41 PM
To: NT System Admin Issues
Subject: RE: [OT] Obama birth certificate
Yeah, we're a Republic, just like in Star Wars!
From: Steven Peck [mailto:sep...@gmail.com]
Sent:
You're fooling yourself. We're living in a dictatorship.
From: Paul Gordon [mailto:paul_gor...@hotmail.com]
Sent: Friday, March 18, 2011 3:16 AM
To: NT System Admin Issues
Subject: RE: [OT] Obama birth certificate
No, you're an anarcho-syndicalist commune :)
Paul G.
From: Crawford, Scott
Just curious what the issues are with libraries.
Maybe you need to upgrade your users ☺
We’ve only started our win7 deploy, but the libraries seem to just need a small
amount of explanation and then they become quite useful.
If the default location for each library is the location users
, Mar 21, 2011 at 4:00 PM, Crawford, Scott
crawfo...@evangel.edumailto:crawfo...@evangel.edu
wrote:
Maybe you need to upgrade your users J
Sweet zombie Jesus, if I could do that, I could eliminate half my
budget!!!
:-)
-- Ben
~ Finally, powerful endpoint security that ISN'T a resource hog
Delprof fails on windows 7 with antivirus software. AV updates the last
accessed attribute on the files so delprof thinks they've been used recently.
There's a hotfix available, but the fix is included in SP1.
Not sure if that's relevant to your situation, but it bit us.
From: Sean Martin
Jeffrey doesn't appreciate this.
From: Doug Hampshire [mailto:dhampsh...@gmail.com]
Sent: Tuesday, March 22, 2011 2:56 PM
To: NT System Admin Issues
Subject: Re: Ted
Quick, Send Amit in to clear the clogged Jeffries Tube!
On Tue, Mar 22, 2011 at 10:34 AM, Steven M. Caesare
Net cop fail :)
This is one of my pet peeves as well. Also, Does anyone have any info on such
and such. followed by I'd like this info too. repeated ad nauseum.
-Original Message-
From: Ben Scott [mailto:mailvor...@gmail.com]
Sent: Friday, March 25, 2011 8:13 AM
To: NT System Admin
Unlikely, but malware could change the bios password.
From: Bill Humphries [mailto:nt...@hedgedigger.com]
Sent: Monday, March 28, 2011 2:17 PM
To: NT System Admin Issues
Subject: Re: wild wild west of small clients.
Yeah. It took a couple of conversations to make her understand that this BIOS
certainly SET one if one isn't currently set. That capability is exposed
in WMI (although not all vendors may implement the necessary API hooks).
Regards,
Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com
From: Crawford, Scott [mailto:crawfo...@evangel.edu]
Sent
I recently had chkdsk run on a 2tb iscsi volume. I think it took about 5 hours.
Sent from my Palm Pre on the Now Network from Sprint
On Mar 29, 2011 7:56 PM, Mike Leone oozerd...@gmail.com wrote:
On 3/29/2011 8:41 PM, Jonathan Link wrote:
Then I would down
I've uninstalled that a few times in similar situations and not seen any
problems.
From: Stefan Jafs [mailto:stefan.j...@gmail.com]
Sent: Wednesday, March 30, 2011 3:19 PM
To: NT System Admin Issues
Subject: Re: Windows Desktop search 3.01 removal
Yes from Googeling it seems it should be ok and
+1
-Original Message-
From: Joseph L. Casale [mailto:jcas...@activenetwerx.com]
Sent: Friday, April 01, 2011 3:27 PM
To: NT System Admin Issues
Subject: RE: Windows 7 Imaging
I wouldn't use WDS on its own, its basically just a PXE server.
Right, which can deliver a base, non-customized
Nice overview. Thanks.
From: Michael B. Smith [mailto:mich...@smithcons.com]
Sent: Friday, April 01, 2011 3:37 PM
To: NT System Admin Issues
Subject: RE: Windows 7 Imaging
So, Microsoft doesn't just have a Windows Deployment Services Server, they
have an entire deployment stack. From the most
Isn't waik a requirement for installing MDT? Or is there some version specific
things I'm overlooking?
From: Michael B. Smith [mailto:mich...@smithcons.com]
Sent: Friday, April 01, 2011 4:19 PM
To: NT System Admin Issues
Subject: RE: Windows 7 Imaging
If you are using any higher-level of the
System Admin Issues
Subject: RE: Windows 7 Imaging
Nope, you can install it.
Granted, the list of things you can accomplish without WAIK is small.
Regards,
Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com
From: Crawford, Scott [mailto:crawfo...@evangel.edu]
Sent
Yeah, that's the situation we're in. In fact we already have the SCCM license
since it's so cheap through our campus agreement ($50/yr maybe).
I really haven't even glanced at it yet, but that's my plan for the near
future. Is it such that I can load SCCM onto one server with no reliance on a
the eCAL, there is usually /substantial/
savings with getting FEP (Forefront Endpoint) deployed as part of this.
Thanks,
Brian Desmond
br...@briandesmond.commailto:br...@briandesmond.com
c - 312.731.3132
From: Crawford, Scott [mailto:crawfo...@evangel.edu]
Sent: Friday, April 01, 2011 8:50 PM
...@briandesmond.commailto:br...@briandesmond.com
c - 312.731.3132
From: Crawford, Scott [mailto:crawfo...@evangel.edu]
Sent: Friday, April 01, 2011 8:50 PM
To: NT System Admin Issues
Subject: RE: Windows 7 Imaging
Yeah, that's the situation we're in. In fact we already have the SCCM license
since it's so
You don't really need to patch macs since they don't have vulnerabilities.
From: John Hornbuckle [mailto:john.hornbuc...@taylor.k12.fl.us]
Sent: Monday, April 04, 2011 1:54 PM
To: NT System Admin Issues
Subject: RE: Succumbing to the demand for a Mac on my network
How will you handle patch
.
[regarding The Tick] He's nigh-invulnerable, he'll be ok. -Arthur
--
ME2
On Mon, Apr 4, 2011 at 11:56 AM, Crawford, Scott
crawfo...@evangel.edumailto:crawfo...@evangel.edu wrote:
You don't really need to patch macs since they don't have vulnerabilities.
From: John Hornbuckle
101 - 200 of 653 matches
Mail list logo