Try this one http://www.softperfect.com/products/lspro/
-Original Message-
From: WhtWlf2001 [mailto:[EMAIL PROTECTED]]
Sent: domingo, 12 de Janeiro de 2003 21:43
To: [EMAIL PROTECTED]
Subject: Network Scan
All,
I'm looking to find a tool or the best way to accomplish the following:
Sca
From: Philip Storry <[EMAIL PROTECTED]>
However, if you do feel that they are a problem, then I would suggest
that you look at implementing a procedure whereby holidays should
require notification of the IT/IS teams, so that the user's accounts
can be disabled for the duration of their absence. Tha
Since you are running Win2K, you could configure RRAS instead of ICS and
improve your security that way. For free f/w I use the free version of Zone
Alarm available from
http://www.zonelabs.com/store/content/catalog/products/zonealarm/znalm_detai
ls.jsp and if you are looking for a free a/v soult
I am afraid Linux has to be the last choice since Microsoft has been out
biggest "donator". We have had so much money, software and support (their
employees truly helping out with the kids). I cannot replace the W2K server
with Linux. I may get old PCs and put it in front of the W2K Server. So far
If you have a machine that is currently logged on using the old password,
then the new password will cause the account to constantly be locked out.
-Original Message-
From: Alex Tarata [mailto:[EMAIL PROTECTED]]
Sent: Sunday, 12 January 2003 3:42 PM
To: [EMAIL PROTECTED]
Subject: Account
Thanks Harold.
Done pretty much what you mentioned. I mean it is good so far as least until
the *nix firewall is setup or we get some hardware firewall sponsored to us.
Kind Regards
Gill
ps - just wondering how soon would a new release of Windows (e.g. Windows
.NET Server 2003 RC2) get compromis
Check to see if any services are using the old password (ie, Backup exec, etc...)
Shayla
I had something close to the same problem, where one of my desktop
machines was locking out an account on our file server, and blocking the
person who needed to use the account. I turned on logon auditing on the
server, and it gave me the machine and service that was trying to logon
to the server
Hi guys,
First of all i want to thank everyone for your input. This was great, i
got more than i needed. To explain more what happend as i did not
clarify everything from the first time.
It is imperative that in this case that the admin account was used to
log the machines in, run services and
Hey there,
for the first time I have to setup an internet cafe. I want to use Win2k
on the workstations and "cripple" it using the policies it has, then use
linux as a firewall/proxy with squid. Having only a proxy and not a
gateway should already narrow down a lot of security issues, but I
believ
Just as an FYI.
You can do this natively in Windows XP and it will
also be available in Windows Server 2003.
A -o switch has been added to the netstat command
which will display the PID of the process that owns
the port.
Jim
--- René_Schaffrath <[EMAIL PROTECTED]>
wrote:
> Hi,
>
> try Acti
Oops.. I must be not paying too much attention to what I read this morning. It's
allready one of those days and it isn't even close to being over yet. Saw that you
allready checked services -duh.
My opinion is that you probably are missing a service of some sort. We had a similar
issue with Bac
Microsoft's Tweak UI :
http://www.microsoft.com/ntworkstation/downloads/PowerToys/Networking/NTTwea
kUI.asp
Freshdevices' Fresh UI : http://www.freshdevices.com/freshui.html
or
Entire Network is an option under Network Neighborhood that allows users to
see all the Workgroups and Domains on the n
If you can come up with a very low end pc take a look at www.ipcop.org .
It's a free Linux firewall that is very good in my opinion. They have a
great mailing list for support. Then go here
http://www.ipcop.org/cgi-bin/twiki/view/IPCop/IPCopDGHowto for Dan's
Guardian a URL filtering application tha
WhtWlf2001 wrote:
All,
I'm looking to find a tool or the best way to accomplish the following:
Scan WindowsNT machines on the local network, authenticate with a known admin password, and search
for specific files on the local hard drive, log success, failures and file information. In this
first
I have heard from more than a couple sources that there are some burglars
that use out-of-office replies to target homes, by matching email addresses
to street addresses in online directories.
Glenn
-Original Message-
From: Rodel Calvario [mailto:[EMAIL PROTECTED]]
Sent: Thursday, Janua
And when we do get vacations, we still check our email remotely!
mike heitz ** sr it manager ** UPSHOT
312-943-0900 x5190
-Original Message-
From: Jonathan Nichols [mailto:[EMAIL PROTECTED]]
Sent: Friday, January 10, 2003 6:43 PM
To: Rodel Calvario
Cc: [EMAIL PROTECTED]
Subject: Re: Inpu
Alex,
It would seem the way you are doing this has some problems. Here is some
advice:
Create a service account to run your scripts under.
Rename your admin account and change the passowrd. Put the password in a
safe. Give the combination to the CIO.
Create a domain admin account for e
-BEGIN PGP SIGNED MESSAGE-
Fellow list folk:
Situation: My company is very restrictive on internet and email use. Only select
users are allowed external use, and fewer still have unrestricted net access.
Communications (email) with 'customer data' are not permitted outside the corpo
Hmmm...thoughts on the following?
1. Run a SSH server on each Windows station
2. Upload Cygwin's Find program and needed DLLs
3. Schedule an AT command on the Windows station (remotely through the
SSH connection) to look, using find, for the file extensons you're looking
for and output result
coyote linux is good an free. It uses ipchains as it's firewall.I know you can block
Ips but i'm not sure about URLs. Coyote linux was their help at this site
www.dalantech.com. This site also has a lot of good info on security in general.
Chris
-Original Message-
From: Clinton McGuire
I just recently set up internet connection sharing on a windows 2000
server similar to what you're asking to do. When I set up ICS windows
changed the IP address of that nic to something like 169.0.0.1.
If you create a DHCP scope to assign all your clients addresses starting
at 169.0.0.2 ( or what
Quite simply, can you afford the licence for Borderware for this?
Netscreen have some smaller products that are not much more expensive
than a small router.
Paul Mahoney
FiberStarr Systems
www.fiberstarr.com
-Original Message-
From: H.Hamza [mailto:[EMAIL PROTECTED]]
Sent: Friday, Ja
Vision is another product that will allow you to map open ports to programs
that are running/listening on these. You can download it from Foundstone's
web site (http://www.foundstone.com/).
Rafael Rosado
IT Security Manager
Caribbean and Latin America Region (CALA)
Lucent Technologies O
Corpora
24 matches
Mail list logo