True, but they are already storing EPHI/PII on these PC systems, and if
those HD's are encrypted, then you have the possibility of breach
notification if the PC or the HD goes missing, which is notification to
HHS and the insuing fines and fallout.
Now add that healthcare organizations want
Normal people believe that if it ain't broke, don't fix it.
Engineers believe that if it ain't broke, it doesn't have enough
features yet.
-Original Message-
From: Carl Houseman [mailto:c.house...@gmail.com]
Sent: Wednesday, March 02, 2011 6:03 PM
To: NT System Admin Issues
Subject:
Drivers?
Remove/add printer?
Have user sign onto another computer and see what happens?
I hate printers...
J
Don Guyer
Windows Systems Engineer
Datasafe Platform
Enterprise Technology Group
Fiserv
don.gu...@fiserv.com
Office: 1-800-523-7282 x 1673
Fax: 610-293-4499
The white paper request tells me that she has color as her default paper
for tray 1.
On Wed, Mar 2, 2011 at 3:42 PM, David Mazzaccaro
david.mazzacc...@hudsonmobility.com wrote:
Thx
I just went through all those settings, they appear identical to other
users who are printing fine.
Seems
Hi guys,
Sorry for the cross-post. We are about to move to hosted Exchange but we have
several users that when they open Outlook it connects to several Exchange
mailboxes, surely there's an attribute (reg key?) on each PC I can query to
find out who connects to which additional mailboxes? A
Thx... I am checking everywhere in here, and I can't seem to find
anything where she would specifically set that
PRINTERS!
From: Todd Lemmiksoo [mailto:tlemmik...@gmail.com]
Sent: Thursday, March 03, 2011 10:30 AM
To: NT System Admin Issues
Subject: Re: Word 2007 only prints to
Hi Guys,
I'd love to get your input about social engineering.
Could you take a minute and give me your feedback?
All participants will be entered in a draw for the new iPad II
Thanks so much!
http://www.knowbe4.com/social-engineering-survey-2/
Warm regards,
Stu
..
~ Finally, powerful
so is this a social engineering exercise to get us to reveal passwords
and logins?
@THIS STATMENT IS VERIFIABLY INCORRECT
On Thu, Mar 3, 2011 at 07:58, Stu Sjouwerman s...@sunbelt-software.com wrote:
Hi Guys,
I'd love to get your input about social engineering.
Could you take a minute
Do I win the iPad if I reply to you directly and not click on an embedded link
I’m not sure of?
Doug Hilderbrand | Systems Analyst, Information Technology | Crane Aerospace
Electronics
Work: 425-743-8172 | Mobile: 425-835-DOUG(3684)
From: Stu Sjouwerman
Social Engineering: The new old thing!
--
ME2
On Thu, Mar 3, 2011 at 8:15 AM, S Powell powe...@gmail.com wrote:
so is this a social engineering exercise to get us to reveal passwords
and logins?
@THIS STATMENT IS VERIFIABLY INCORRECT
On Thu, Mar 3, 2011 at 07:58, Stu Sjouwerman
Classification: UNCLASSIFIED
Caveats: FOUO
What is a STATEMENT?
-Original Message-
From: S Powell [mailto:powe...@gmail.com]
Sent: Thursday, March 03, 2011 11:16 AM
To: NT System Admin Issues
Subject: Re: Social Engineering Survey - Win the new iPad II
so is this a social engineering
Classification: UNCLASSIFIED
Caveats: FOUO
Damn spell checker corrected the word 'STATMENT' just as I clicked send...
-Original Message-
From: Kent, Larry CTR US USA [mailto:larry.k...@us.army.mil]
Sent: Thursday, March 03, 2011 1:35 PM
To: NT System Admin Issues
Subject: RE: Social
+1
Easy to write, easy to maintain.
--
ME2
On Tue, Mar 1, 2011 at 6:37 AM, Harry Singh hbo...@gmail.com wrote:
I don't have the script in front of me, but I've used PSEXEC to call a
net localgroup administrators on the remote machine to determin who is
part of said local group.
On
Definitely interested at looking at your script as well.
On Wed, Mar 2, 2011 at 7:28 PM, Micheal Espinola Jr
michealespin...@gmail.com wrote:
I'll post it after a little cleanup. I recently had to change it because
Ninite significantly changed thier site and link method. They went from
Guys - Its nothing special, except for a creative FOR loop. I just picked
packages, and copied the links.
You may not want the packages I put together. But, you probably would. :-)
Because of the recent changes that Ninite made, it does still require some
refining. My initial WGET
Does the cluster.exe utility allow you to add this accordingly?
Take a look at this KB: 284838
http://support.microsoft.com/kb/284838
Z
Edward E. Ziots
CISSP, Network +, Security +
Network Engineer
Lifespan Organization
Email:ezi...@lifespan.org
Cell:401-639-3505
From: David Lum
Bingo! I had looked at another MS support Cluster page but it didn't have this
info, thanks!
-Original Message-
From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: Thursday, March 03, 2011 11:42 AM
To: NT System Admin Issues
Subject: RE: Shares and clusters
Does the cluster.exe
Done, Stu
BTW, you have several OTHER options that aren't accompanied by their own
button, forcing you to choose something else in conjunction with writing
something into the OTHER text field.
*ASB *(Find me online via About.Me http://about.me/Andrew.S.Baker/bio)
*Exploiting Technology for
Call it beta or version 0.7 and you'll be fine.
If questioned, follow-up with the ever useful, It works on my machine.
*ASB *(Find me online via About.Me http://about.me/Andrew.S.Baker/bio)
*Exploiting Technology for Business Advantage...
*
On Thu, Mar 3, 2011 at 2:15 PM, Micheal Espinola
Ditto, also completed.
Z
Edward E. Ziots
CISSP, Network +, Security +
Network Engineer
Lifespan Organization
Email:ezi...@lifespan.org
Cell:401-639-3505
From: Andrew S. Baker [mailto:asbz...@gmail.com]
Sent: Thursday, March 03, 2011 2:56 PM
To: NT System Admin Issues
Subject:
Is ditto the new +1 ? :-) Ditto for me too.
--
ME2
On Thu, Mar 3, 2011 at 12:04 PM, Ziots, Edward ezi...@lifespan.org wrote:
Ditto, also completed.
Z
Edward E. Ziots
CISSP, Network +, Security +
Network Engineer
Lifespan Organization
Email:ezi...@lifespan.org
Had to do this once too... I believe its:
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows
Messaging Subsystem\Profiles\Outlook
Looks like a bunch of gibberish at first look, but looking through the keys,
I do see the LegacyDNs for all my additional mailboxes.
Thanks guys ! And thanks for the heads-up on the other bug. LOL
Stu
From: Andrew S. Baker [mailto:asbz...@gmail.com]
Sent: Thursday, March 03, 2011 2:56 PM
To: NT System Admin Issues
Subject: Re: Social Engineering Survey - Win the new iPad II
Done, Stu
BTW,
Ditto was +1 before +1 was even born.
On Thu, Mar 3, 2011 at 3:11 PM, Micheal Espinola Jr
michealespin...@gmail.com wrote:
Is ditto the new +1 ? :-) Ditto for me too.
--
ME2
On Thu, Mar 3, 2011 at 12:04 PM, Ziots, Edward ezi...@lifespan.orgwrote:
Ditto, also completed.
Z
Exactly. Ditto indicates Old School!!
From: Richard Stovall [mailto:rich...@gmail.com]
Sent: Thursday, March 03, 2011 3:19 PM
To: NT System Admin Issues
Subject: Re: Social Engineering Survey - Win the new iPad II
Ditto was +1 before +1 was even born.
On Thu, Mar 3, 2011 at 3:11 PM, Micheal
I like me some Run DMC. old school.
On Thu, Mar 3, 2011 at 2:23 PM, Kennedy, Jim
kennedy...@elyriaschools.orgwrote:
Exactly. Ditto indicates Old School!!
*From:* Richard Stovall [mailto:rich...@gmail.com]
*Sent:* Thursday, March 03, 2011 3:19 PM
*To:* NT System Admin Issues
*Subject:*
Naaa,
Beastie Boys: NO sleep till Brooklyn... or the fav's walk this way
with RUN DMC and Aerosmith...
Z
Edward E. Ziots
CISSP, Network +, Security +
Network Engineer
Lifespan Organization
Email:ezi...@lifespan.org
Cell:401-639-3505
From: Steve Ens
Ok, I’m venturing into the big unknown . . . . . . . world of Linux and the
reason is, we are setting up an e-commerce site and the developer insists on
using Linux for the webserver. So I hired a consultant and had the server up
and running in an afternoon and they are now loading the web
Keep in mind that if you can decipher this, it will only return the values for
the current user. You'll need to enumerate all the profiles on the machine and
inspect this key in each profile.
From: Sam Cayze [mailto:sca...@gmail.com]
Sent: Thursday, March 03, 2011 2:16 PM
To: NT System Admin
Why not just run a test restore? See if it is sufficient? I don't see it
wouldn't be enough, you are backing up the whole server.
On Thu, Mar 3, 2011 at 2:45 PM, Stefan Jafs stefan.j...@gmail.com wrote:
Ok, I’m venturing into the big unknown . . . . . . . world of Linux and
the reason is,
I actually got introduced to both of those groups at the same time...like
them both, but Paul's Boutique is probably my favourite.
On Thu, Mar 3, 2011 at 2:32 PM, Ziots, Edward ezi...@lifespan.org wrote:
Naaa,
Beastie Boys: NO sleep till Brooklyn… or the fav’s “walk this way” with RUN
DMC
Why does the the developer get to dictate... oh never mind.
Tell the developer that you need a backup/restore plan as part of the turn
over to production and have such documentation be added to the scope of work
for (his buddy :) the consultant along with an actual test of the backup
restore
Hedley Lamarr: My mind is aglow with whirling, transient nodes of
thought careening through a cosmic vapor of invention.
Taggart: Ditto.
From: Steve Ens [mailto:stevey...@gmail.com]
Sent: Thursday, March 03, 2011 2:30 PM
To: NT System Admin Issues
Subject: Re: Social Engineering Survey -
Point, well taken, sometimes you are too close to the issue and don't think
clearly.
Obviously it should (will be) part of the acceptance of the software to
document a proper backup procedure.
Thanks for pointing it out.
On Thu, Mar 3, 2011 at 4:03 PM, Steven Peck sep...@gmail.com wrote:
It depends on what type of backups the BUE is taking, if they're transactional
or crash consistent, without the agent I believe they will be crash consistent,
so you will be able to recover the entire server but you might be missing some
data. You can either buy the Linux agent (that would be
Ditto? Ditto, you provincial PUTZ!
Jay Dale
Senior Systems Administrator
c:832.373.7883
From: Maglinger, Paul [mailto:pmaglin...@scvl.com]
Sent: Thursday, March 03, 2011 3:04 PM
To: NT System Admin Issues
Subject: RE: Social Engineering Survey - Win the new iPad II
Hedley Lamarr: My mind is
Bingo, good point. Or use HKEY_USERS\[SID]\... for the appropriate user.
-Sam
From: Crawford, Scott [mailto:crawfo...@evangel.edu]
Sent: Thursday, March 03, 2011 2:51 PM
To: NT System Admin Issues
Subject: RE: Outlook really...
Keep in mind that if you can decipher this, it will only
At a guess you are getting some LAMP based app.
I am going to take some liberal guesses here. At a high level you most
likely has some web based front end, a script language, a database and
certificates for SSL. Most web based front ends can have something that
just copies the files. Make sure
Thanks!
In my situation it's by and large one user profile per machine.
Dave
From: Sam Cayze [mailto:sca...@gmail.com]
Sent: Thursday, March 03, 2011 1:40 PM
To: NT System Admin Issues
Subject: RE: Outlook really...
Bingo, good point. Or use HKEY_USERS\[SID]\... for the appropriate user.
I have an RDS server that I want users to RDP to from RDWeb. From VPN or local
machine they can RDP just fine, and from the RDWeb (where there is an icon TO
the RDP app) they can connect to the HOSTNAME (Server2) but when trying to
connect to Server2 via a DNS Alias (FriendlyName1) the message
On Thu, Mar 3, 2011 at 3:45 PM, Stefan Jafs stefan.j...@gmail.com wrote:
So my question is about backup. I’m running this in VMware 4.0 and my backup
Software is BackupExec 2010 R2. I have the Agent for VMware infrastructure
and can back up the VM that way, just did it and it worked.
Steven
Well, yea, but you know how things cycle. I mean, there are a bunch of JA's
walking around right now in super-tight jeans that are cutting-off
circulation to their nether's...
I paid the price for that intimate knowledge in the 80's! But these
modern-day fools have learned nothing! NOTHING!
I think you'd need a proper reader for that type of control.
--
ME2
On Thu, Mar 3, 2011 at 12:45 PM, Joseph L. Casale jcas...@activenetwerx.com
wrote:
Is there a way in Outlook to subscribe to an rss feed such that it only
displays items from the feed, and upon a refresh would purge
I figured as much, thanks!
jlc
From: Micheal Espinola Jr [mailto:michealespin...@gmail.com]
Sent: Thursday, March 03, 2011 5:10 PM
To: NT System Admin Issues
Subject: Re: RSS Help
I think you'd need a proper reader for that type of control.
--
ME2
On Thu, Mar 3, 2011 at 12:45 PM, Joseph L.
Somewhat. But you will likely need to cooperation from the ISP and local law
enforcement on the other-end.
Is proper theft-tracking software involved, or do you only have rudimentary
IP address information?
--
ME2
On Thu, Mar 3, 2011 at 5:33 PM, Gene Giannamore
More of a proof of concept. Can it be done, kinda thing. From my research seems
fairly involved and has a low chance of success. I could be wrong though. Check
the logs, find the remote ISP, contact them and somehow get the location info,
see if the police there aren't busy, hope the location
Its really depends.
A visual traceroute can be very helpful or incredibly misleading. You may
get the correct town, or you may not. It depends heavily on the accuracy of
the information publicly available by the ISP, and how they have/are
managing their IP addresses. The best bet is to
I think it would be better if you had the MAC Address of the Laptop. Since
the network card, and wireless card, have a MAC Address assigned by the
manufacturer you could do a search to see if that MAC Address shows up on
the Internet. But Micheal is right, you probably would need a Level 1 ISP to
Can it be done...yes it is possible. Highly unlikely, very improbable. You
won't be able to get the police to move fast enough and you need that to happen
to get the ISP to give you the location. Imagine calling the San Francisco PD
and trying to get to someone that understands what you are
Those are all excellent points. If you take into account the abilities of
the theif/user, the MAC could also be spoofed.
--
ME2
On Thu, Mar 3, 2011 at 5:59 PM, Daniel Rodriguez drod...@gmail.com wrote:
I think it would be better if you had the MAC Address of the Laptop. Since
the network
On Thu, Mar 3, 2011 at 8:59 PM, Daniel Rodriguez drod...@gmail.com wrote:
I think it would be better if you had the MAC Address of the Laptop. Since
the network card, and wireless card, have a MAC Address assigned by the
manufacturer you could do a search to see if that MAC Address shows up on
There are a handful of free utilities to facilitate this:
http://adeona.cs.washington.edu/
http://www.locatemylaptop.com
I've played with them but have never tested the recovery process.
Roger Wright
___
A friend of mine sold his house this week. He got a pretty good price
for it, but his
I realize this is locking the barn after the horses have escaped, but I
heard about a product called Laptoplock, that can be installed on a laptop
computer. Anyone know anything about it?
Murray
_
From: Ben Scott [mailto:mailvor...@gmail.com]
Sent: Thursday, March 03, 2011 9:03 PM
Any software installed can be defeated. However, some vendors do have
hardware-based tracking.
--
ME2
On Thu, Mar 3, 2011 at 7:15 PM, MMF mmfree...@ameritech.net wrote:
I realize this is locking the barn after the horses have escaped, but I
heard about a product called Laptoplock, that
The practical answer is no.
This is potentially a less emphatic NO under IPv6.
*ASB *(Find me online via About.Me http://about.me/Andrew.S.Baker/bio)
*Exploiting Technology for Business Advantage...
*
On Thu, Mar 3, 2011 at 8:33 PM, Gene Giannamore
gene.giannam...@abideinternational.com
55 matches
Mail list logo