I'd run it on a PC first. Capture the traffic when you try to browse to
a web page then have a look through the capture. You'll be able to see
when it resolves the dns address and basically what happens after that.
It's all time stamped so something obvious may appear.
Also compare two
Isn't Insight Manager still around?
Typed frustratingly slowly on my BlackBerry® wireless device
-Original Message-
From: Jonathan ncm...@gmail.com
Date: Wed, 16 Mar 2011 00:57:35
To: NT System Admin Issuesntsysadmin@lyris.sunbelt-software.com
Reply-To: NT System Admin Issues
Well, I don't really want to have to have one drive per volume solely to
hold shadow copies, and it seems that leaving things on the default i.e.
simply enabling shadow copies, still results in all shadow copies being
randomly deleted when there is high IO on the volumes (and at random
times, not
Has anyone got any examples they'd care to share of using
*lcsenableconfigureusers.wsf
*from the OCS 2007 Resource Kit to configure users for Communications Server
from the command line? I'm struggling to get this to work and I am sure it
is the syntax of my users or config files that is somewhat
Done it again.
A bit of deeper digging revealed this VBScript, which does the trick where
lcsenableconfigureusers was failing me
*
' Username and password of a member of the RTCDomainUserAdmins group
strAdminUsername = CN=,OU=xxx,OU=xxx,DC=xxx,DC=xxx,DC=xx
strAdminPassword = xx
'
http://support.microsoft.com/kb/288991
From: Micheal Espinola Jr [mailto:michealespin...@gmail.com]
Sent: Tuesday, March 15, 2011 10:45 PM
To: NT System Admin Issues
Subject: Re: Folder permissions for redirected profiles
+1
--
ME2
On Wed, Mar 9, 2011 at 7:04 AM, Miller
Is you want to see if port 80/433 is open on the end-point device a simple NMAP
command will tell you this ( If there is an acl on the router/VPN) it will show
( Filtered)
Nmap –sS –P0 –p 80,443 IP_ADDRESS_OF_Server
Z
Edward E. Ziots
CISSP, Network +, Security +
Network Engineer
Do you know if port 80/443 is open on the web-server first before you try and
start and make sure the http port is open on the end-point device before trying
to find out why the page cant be displayed. ( IE 404 error)
Z
Edward E. Ziots
CISSP, Network +, Security +
Network Engineer
Look at it this way,
What is the risk?
1) Usually folks don't deploy technology without full testing it,
putting in the proper change management and approval.
2) Access to the server console is highly restricted
3) Outbound access via 80/433 web traffic from the
I have an executive user that is missing one appointment in his outlook
calendar that is in his IPhone calendar. I have looked in deleted items,
exchange event logs without any clue as to what may have happened. All other
appointments for the week are sync'd between Outlook and IPhone.
The
Good idea.. Limits the traffic down so I can see it easier. Will let you know.
Thanks!
Greg Sweers
CEO
ACTS360.comhttp://www.acts360.com/
P.O. Box 1193
Brandon, FL 33509
813-657-0849 Office
813-758-6850 Cell
813-341-1270 Fax
From: James Hill [mailto:j.h...@coffeeclub.com.au]
Sent: Wednesday,
We just sent 2 HP servers to a client, configured the exact same way
(O/S, drivers, BIOS, blah, blah, blah) and one of them had an issue
where the server just kept shutting itself down.
Had them call HP and they connected remotely to update the BIOS, NIC
drivers and NIC firmware.
You can also install Fiddler on the PC Client, and look at the http
traffic being sent and the HTTP error codes, but I agree looking at
Layer 3 traffic is first, before looking at Layer 7.
Z
Edward E. Ziots
CISSP, Network +, Security +
Network Engineer
Lifespan Organization
It sounds like he somehow got it on his local device calendar instead of the
Exchange calendar. Does he have any other calendar-synching accounts on the
device (mobileme, gmail, etc)? That's where I'd start looking.
Jack Kramer
Computer Systems Specialist
University Relations, Michigan
No – that's the point of the exclusive control checkbox. They're not kidding
about it being exclusive. Remember that you can still take ownership of the
folder on the server side and then re-grant yourself permissions to view;
however, this will be reset the next time the user logs in and
Bit annoying when it comes to finding out which of your 10,000 users has
20GB of holiday snaps in their home drive though. Unless you have safeguards
against that kind of thing.
On 16 March 2011 13:45, Kramer, Jack jack.kra...@ur.msu.edu wrote:
No – that's the point of the exclusive control
You had the latest and greatest PUBLIC versions of the aforementioned
firmware.
What versions did they have, and what versions do they have now?
*ASB *(Find me online via About.Me http://about.me/Andrew.S.Baker/bio)
*Exploiting Technology for Business Advantage...
*
On Wed, Mar 16, 2011
Thanks. Handy utility.
I used NMAP, both on the local LAN and on the remote site.
Local
PORT STATE SERVICE VERSION
80/tcpopen http Microsoft IIS httpd 7.0
Remote
PORT STATE SERVICE VERSION
80/tcpfiltered http
The help file shows...
filtered
Nmap
Yeah, that's what I figured. I'd have to check with the client on the
versions, since they dealt with HP after they setup the server in their
location.
Don Guyer
Windows Systems Engineer
Datasafe Platform
Enterprise Technology Group
Fiserv
don.gu...@fiserv.com
Office: 1-800-523-7282 x
If anyone is interested I found out why this is happening. From here:
http://technet.microsoft.com/en-us/library/cc709647(WS.10).aspx
Group Policy tools will continue to recognize custom ADM files you have in your
existing environment, but will ignore any ADM file that has been superseded by
My safeguard is the clue-by-4 under the desk. :-D
Actually, with a 9TB shared drive and only 60 users in our division we don't
anticipate any problems in the short or medium term; there have been users
who've had personal photos and such redirected to the home share but usually
they manage to
Local firewall on the machine itself? Do newer versions of the Windows Firewall
block accesses from outside their own subnet?
Jack Kramer
Computer Systems Specialist
University Relations, Michigan State University
w: 517-884-1231 / c: 248-635-4955
From: Bob Hartung
I'm predominantly thin client, which explains why I have vastly larger
amounts of crap on my file shares :-)
On 16 March 2011 15:29, Kramer, Jack jack.kra...@ur.msu.edu wrote:
My safeguard is the clue-by-4 under the desk. :-D
Actually, with a 9TB shared drive and only 60 users in our division
I am following the documentation for getting the firewall rule for an
application ( Inbound port and Outbound Server) to work and verify that
packets from any other host are dropped.
We are utilizing the Domain Profile, and I have turned on logging to for
the Domain Profile for Logging and
We have MARS...but rumor is its days are numbered. Not to mention you
cannot get details or customize alerts.
I just finished implementing TriGeo. So far I really like it and support
is great!
Chad Weatherford | Network/Security Administrator | Shoe Carnival, Inc.
| (:812.867.8314 |
Even allowing ALL IP's from the for the rule doesn't seem to help show
that port as open.
Under scope Local IP's I selected all, and under remort IP's I selected
all. ( Should allow any IP to talk to this server locally and process
to talk to any remote IP) if I am reading it right.
Z
What a coincidence! One of our servers was just chocking on the TriGeo
agent. I've only been at this company a few months and just heard about
this. I haven't looked into this yet, but apparently the TG agent will
consume the CPU every once in awhile. Have you witnessed this in your
environment?
I do believe MARS is on life support.
We evaluated Nitro Security appliances (FIPS certified), along with Splunk,
Arcsight and one other whose name is escaping me. We liked Splunk's search
for IT perspective, but didn't like having to build all the rules and
alerts from scratch. Once I get
Does netstat show the port is listening?
On Wed, Mar 16, 2011 at 11:45 AM, Ziots, Edward ezi...@lifespan.org wrote:
Even allowing ALL IP’s from the for the rule doesn’t seem to help show
that port as open.
Under scope Local IP’s I selected all, and under remort IP’s I selected
all. (
We went with Nitro for our new data center as well. I was not part of the
eval process for that though, so I can't really answer too many questions
about it.
On Wed, Mar 16, 2011 at 11:48 AM, Kevin Lundy klu...@gmail.com wrote:
I do believe MARS is on life support.
We evaluated Nitro
Yes,
Port is listening on the local IP of the server. I did a netstat -an
and looked for the port. Also put TCpview on the server accordingly to
see.
Z
Edward E. Ziots
CISSP, Network +, Security +
Network Engineer
Lifespan Organization
Email:ezi...@lifespan.org
Also turned off the firewall on the domain profile, still didn't make a
difference. Still can't see the ports open from an Nmap scan, and I
can't see any packets dropped on the firewall logs which I should be
able to see.
I have inbound connections that don't match a rule are dropped. The
I've heard really good things about Nitro as well
http://www.nitrosecurity.com/
*ASB *(Find me online via About.Me http://about.me/Andrew.S.Baker/bio)
*Exploiting Technology for Business Advantage...
*
On Wed, Mar 16, 2011 at 11:57 AM, Rob Bonfiglio robbonfig...@gmail.comwrote:
We went
No...and I hope I never do!
Chad Weatherford | Network/Security Administrator | Shoe Carnival, Inc.
| (:812.867.8314 | 7: 812.471.9866 | *: cweatherf...@scvl.com
From: Guyer, Don [mailto:don.gu...@fiserv.com]
Sent: Wednesday, March 16, 2011 10:48
To: NT System Admin Issues
Subject:
Sounds like they need a good whitelisting solution ;)
Feed: Schneier on Security
Posted on: Wednesday, March 16, 2011 6:14 AM
Author: schneier
Subject: Hacking Cars with MP3 Files
Impressive
researchhttp://www.itworld.com/security/139794/with-hacking-music-can-take-control-your-car:
By adding
Yer evil.
On Wed, Mar 16, 2011 at 1:44 PM, Crawford, Scott crawfo...@evangel.eduwrote:
Sounds like they need a good whitelisting solution ;)
*Feed:* Schneier on Security
*Posted on:* Wednesday, March 16, 2011 6:14 AM
*Author:* schneier
*Subject:* Hacking Cars with MP3 Files
gawd I hate that same crap... :-)
Now git off ma lawn!
--
ME2
On Thu, Mar 10, 2011 at 5:58 AM, Guyer, Don don.gu...@fiserv.com wrote:
FYI, the young'ns in my kids circles are saying same now instead of
ditto, or +1.
:)
Don Guyer
Windows Systems Engineer
Datasafe Platform
All -
We have a new client that requires our accountants to use their financial
system exclusively. The system lives on their network and will be accessed
via a website, naturally. Now, the topic of check printing came up and I
need to find a way (service, utility, etc) that can allow for remote
This came up in a customer meeting the other day –
http://www.goprint.com/products.html. I believe they have a Kinko’s style web
based solution.
Thanks,
Brian Desmond
br...@briandesmond.com
w – 312.625.1438 | c – 312.731.3132
From: Harry Singh [mailto:hbo...@gmail.com]
Sent: Wednesday,
Might Printershare work?
Sean Rector, MCSE
From: Brian Desmond [mailto:br...@briandesmond.com]
Sent: Wednesday, March 16, 2011 2:34 PM
To: NT System Admin Issues
Subject: RE: Off-Site Printing Options
This came up in a customer meeting the other day –
Perhaps http://www.google.com/chrome/intl/en/p/cloudprint.html would
be worth consideration.
Roger Wright
___
If there's an exception to every rule, is there an exception to that rule?
On Wed, Mar 16, 2011 at 2:29 PM, Harry Singh hbo...@gmail.com wrote:
All -
We have a new client that
:) really not trying to be. I just thought it was an interesting example of
what I'd been talking about.
From: Jonathan Link [mailto:jonathan.l...@gmail.com]
Sent: Wednesday, March 16, 2011 12:55 PM
To: NT System Admin Issues
Subject: Re: FW: Hacking Cars with MP3 Files
Yer evil.
On Wed, Mar
That looks really interesting Roger and I could see a need for that,
personally, in the future. The problem lies here:
Google Cloud Print makes printing more intuitive, accessible and useful, by
letting you print to your printers from* Google Cloud Print-enabled apps *on
any computer or smart
Actually, any app can be used, not just Google Apps.
From: Harry Singh [mailto:hbo...@gmail.com]
Sent: Wednesday, March 16, 2011 2:05 PM
To: NT System Admin Issues
Cc: Roger Wright
Subject: Re: OT: Off-Site Printing Options
That looks really interesting Roger and I could see a need for
No, we back up within the Exchange server using Legato Networker.
Ken Cornetet 812.482.8499
To err is human - to moo, bovine.
-Original Message-
From: Jon D [mailto:rekcahp...@gmail.com]
Sent: Tuesday, March 15, 2011 11:24 AM
To: NT System Admin Issues
Subject: Re: Exchange Database --
Where do you see that Sam?
Why can’t I print to my cloud printer from Chrome?
For now Google Cloud Print is only available in mobile devices such as smart
phones and Chrome notebooks.
http://www.google.com/support/cloudprint/
I don't see a mention that any app is allowed to print, but I could
Interesting--so, did you simply rename the old adm file and re-import into the
affected GPO?
-Original Message-
From: Christopher Bodnar [mailto:christopher_bod...@glic.com]
Sent: Wednesday, March 16, 2011 7:55 AM
To: NT System Admin Issues
Subject: re: GPO question
If anyone is
I'm looking at Printershare right now as well. Thanks.
On Wed, Mar 16, 2011 at 2:35 PM, Sean Rector sean.rec...@vaopera.orgwrote:
Might Printershare work?
Sean Rector, MCSE
*From:* Brian Desmond [mailto:br...@briandesmond.com]
*Sent:* Wednesday, March 16, 2011 2:34 PM
*To:* NT System
Basically by rooting your phone you get the ability to install 3rd party
apps that are not specifically approved by your carrier and as you say,
uninstall crap that you don't want. :-)
From: Erik Goldoff [mailto:egold...@gmail.com]
Sent: Wednesday, March 16, 2011 3:40 PM
To: NT System Admin
I will add overclocking and using custom ROMS which can be used to make the
'desktop' your own or different experience. Tethering without paying and
running Gingerbread now and on a phone that maybe won't ever get it.
Good place to go figure it all out: http://www.droidforums.net/
Under control panel, Network Sharing Center, can you confirm that NIC is
actually using the domain profile and not a different one?
From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: Wednesday, March 16, 2011 9:08 AM
To: NT System Admin Issues
Subject: RE: Windows Firewall question WIndows
Rooting also depends on your tinkering level, how necessary is your phone on
your daily life. I have a nexus one running the custom Cyanogen Rom. Rooting is
medium complex but once you get it, the whole world opens. I can now Tether my
ipad on tmobile w/o paying extra, loaded better VPN
Thank you for the input !
Erik Goldoff
IT Consultant
Systems, Networks, Security
' Security is an ongoing process, not a one time event ! '
-Original Message-
From: Kennedy, Jim [mailto:kennedy...@elyriaschools.org]
Sent: Wednesday, March 16, 2011 3:43 PM
To: NT System Admin
Hacking ActiveSync to lie to Exchange about the level of policy
enforcement
On Wed, Mar 16, 2011 at 12:39 PM, Erik Goldoff egold...@gmail.com wrote:
Lately I’ve been seeing a number of articles and videos on rooting
Android phones, including the HTC EVO that I use.
Besides the obvious
I'll second the vote for DroidForums and add http://www.xda-developers.com.
Sean Rector, MCSE
-Original Message-
From: Kennedy, Jim [mailto:kennedy...@elyriaschools.org]
Sent: Wednesday, March 16, 2011 3:43 PM
To: NT System Admin Issues
Subject: RE: OT Rooting Android phones
I will
Due to a third party app we have some servers running W2K8 *32-bit*
SQL 2008 on said machines does not seem to want to use the full 16GB
The vendor has NO plans to upgrade their product. (yeah I'm looking at YOU
Sterling Software)
I have PAE and AWE turned on, and the machine is still using 3GB
So John, which Android phone do you have, and what advantages did you gain
after rooting ?
Erik Goldoff
IT Consultant
Systems, Networks, Security
' Security is an ongoing process, not a one time event ! '
-Original Message-
From: John Aldrich [mailto:jaldr...@blueridgecarpet.com]
Thanks !
Erik Goldoff
IT Consultant
Systems, Networks, Security
' Security is an ongoing process, not a one time event ! '
-Original Message-
From: Garcia-Moran, Carlos [mailto:cgarciamo...@spragueenergy.com]
Sent: Wednesday, March 16, 2011 3:49 PM
To: NT System Admin Issues
J
Erik Goldoff
IT Consultant
Systems, Networks, Security
' Security is an ongoing process, not a one time event ! '
From: Steven Peck [mailto:sep...@gmail.com]
Sent: Wednesday, March 16, 2011 3:55 PM
To: NT System Admin Issues
Subject: Re: OT : Rooting Android phones
Hacking
Thanks, speed is definitely a benefit
Erik Goldoff
IT Consultant
Systems, Networks, Security
' Security is an ongoing process, not a one time event ! '
From: Daniel Rodriguez [mailto:drod...@gmail.com]
Sent: Wednesday, March 16, 2011 3:50 PM
To: NT System Admin Issues
Subject: Re: OT
25% ? That’s substantial, thanks.
Erik Goldoff
IT Consultant
Systems, Networks, Security
' Security is an ongoing process, not a one time event ! '
From: Sean Rector [mailto:sean.rec...@vaopera.org]
Sent: Wednesday, March 16, 2011 3:58 PM
To: NT System Admin Issues
Subject: RE: OT :
Wait for it...
On Wed, Mar 16, 2011 at 4:08 PM, Erik Goldoff egold...@gmail.com wrote:
So John, which Android phone do you have, and what advantages did you gain
after rooting ?
Erik Goldoff
IT Consultant
Systems, Networks, Security
' Security is an ongoing process, not a one time
None... can't afford the data plan. :-( Just speaking about what I've read.
-Original Message-
From: Erik Goldoff [mailto:egold...@gmail.com]
Sent: Wednesday, March 16, 2011 4:09 PM
To: NT System Admin Issues
Subject: RE: Rooting Android phones
So John, which Android phone do you
Not to mention some friends on another, local, mailing list have Android
devices and have talked about rooting them.
-Original Message-
From: John Aldrich [mailto:jaldr...@blueridgecarpet.com]
Sent: Wednesday, March 16, 2011 4:20 PM
To: NT System Admin Issues
Subject: RE: Rooting
Thought so, but didn't read my original message :
Besides the obvious ‘gaining root access’, has anyone done this that can
list some of the benefits from rooting your phone ?
OMFG ! so you think I cannot read the same second hand information that you
can ? I was specifically seeking first hand
Think you need windows enterprise to support more than 4GB. Or R2
On Wed, Mar 16, 2011 at 4:07 PM, G.Waleed Kavalec kava...@gmail.com wrote:
Due to a third party app we have some servers running W2K8 *32-bit*
SQL 2008 on said machines does not seem to want to use the full 16GB
The vendor
Not if you are 64-bit, though, right?
From: Jeff Bunting [mailto:bunting.j...@gmail.com]
Sent: Wednesday, March 16, 2011 4:25 PM
To: NT System Admin Issues
Subject: Re: Getting SQL 2008 to use 16GB RAM
Think you need windows enterprise to support more than 4GB. Or R2
On Wed, Mar 16,
Erik, you're right. I did overlook the part about first-hand experience.
That being said, at least I gave you valid information. I don't know what
your problem is, but I'm a bit tired of your dogging me. You don't want to
see my contributions, then filter me out, or can't you figure out how to
http://www.youtube.com/watch?v=kzIZ_ygG-kQ
On Wed, Mar 16, 2011 at 4:36 PM, John Aldrich
jaldr...@blueridgecarpet.comwrote:
Erik, you're right. I did overlook the part about first-hand experience.
That being said, at least I gave you valid information. I don't know what
your problem is, but
Holy crap, I thought Erik was joking amongst friends. If that is not the
case that it is totally uncalled for.
On Wed, Mar 16, 2011 at 3:36 PM, John Aldrich
jaldr...@blueridgecarpet.comwrote:
Erik, you're right. I did overlook the part about first-hand experience.
That being said, at least I
A 32-bit application will consume a max of 3GB of ram per process. PAE will
allow multiple apps to exist within a larger-than-3GB space without paging;
however your individual programs are still memory limited.
Jack Kramer
Computer Systems Specialist
University Relations, Michigan State
We are Enterprise.
2008 R2 is only 64bit.
On Wed, Mar 16, 2011 at 3:25 PM, Jeff Bunting bunting.j...@gmail.comwrote:
Think you need windows enterprise to support more than 4GB. Or R2
On Wed, Mar 16, 2011 at 4:07 PM, G.Waleed Kavalec kava...@gmail.comwrote:
Due to a third party app we
Then I really don't understand why we are paging at all.
On Wed, Mar 16, 2011 at 3:48 PM, Kramer, Jack jack.kra...@ur.msu.eduwrote:
A 32-bit application will consume a max of 3GB of ram per process. PAE will
allow multiple apps to exist within a larger-than-3GB space without paging;
however
Sounds like poor system design.
What reason on Earth justified tying the music player to the vehicle
control systems?
Kurt
On Wed, Mar 16, 2011 at 10:44, Crawford, Scott crawfo...@evangel.edu wrote:
Sounds like they need a good whitelisting solution ;)
Feed: Schneier on Security
Posted
Someone there asked the very same question...
On Wed, Mar 16, 2011 at 4:52 PM, Kurt Buff kurt.b...@gmail.com wrote:
Sounds like poor system design.
What reason on Earth justified tying the music player to the vehicle
control systems?
Kurt
On Wed, Mar 16, 2011 at 10:44, Crawford, Scott
Generally speaking, I would be inclined to do both.
It helps if access is somehow granted to the machine via another vector.
Layered security is almost always desirable.
*ASB *(Find me online via About.Me http://about.me/Andrew.S.Baker/bio)
*Exploiting Technology for Business Advantage...
*
Finally got a call back from eSoft tech support (firewall vendor). Their
firewall rules are hierarchical so where a rule falls in the pecking order
matters. Turns out the webaccess rule came before the VPN rule. As such,
the internal webserver address was passed to the web proxy and failed
No, you CAN install 3rd Party Apps without Rooting...
-Original Message-
From: John Aldrich [mailto:jaldr...@blueridgecarpet.com]
Sent: Wednesday, March 16, 2011 2:41 PM
To: NT System Admin Issues
Subject: RE: Rooting Android phones
Basically by rooting your phone you get the ability to
I imagine it went something like this...
We can save costs if we combine all in-car computing to one processor. Plus,
it will give us the ability to display engine stats on the CD display.
I seriously doubt anyone came up with:
What if someone writes a malicious .mp3 file?
But, if they did,
Erik, I also have (and love) the EVO.
I've always hacked and tinkered with every phone I have.
I initially rooted the EVO a lot and played with many roms when I first
purchased it. However, throughout time I have stopped doing so, and kept
with the stock rom. Mainly because it got to be
I knew there had to be reason for the Toyota accelerations...
From: Jonathan Link [mailto:jonathan.l...@gmail.com]
Sent: Wednesday, March 16, 2011 3:57 PM
To: NT System Admin Issues
Subject: Re: FW: Hacking Cars with MP3 Files
Someone there asked the very same question...
On Wed, Mar 16,
Every time I'm listening to Sammy Hagar...
From: Maglinger, Paul [mailto:pmaglin...@scvl.com]
Sent: Wednesday, March 16, 2011 4:37 PM
To: NT System Admin Issues
Subject: RE: FW: Hacking Cars with MP3 Files
I knew there had to be reason for the Toyota accelerations...
From: Jonathan Link
The page file in Windows is not just for when the OS or an application runs
out of memory.
The pagefile can be used by applications to store data that does not need to
sit in memory, but needs to be recalled faster than from a regular disk
location.
I would suggest that you use Task Manager and
Erik,
I rooted my Motorola Droid when I first got it. I rooted it just to
have root access but then found some apps that will allow me to tether
my phone as a wi-fi hotspot. I had often loaded different roms and such
but that got old real quick. I can't run updates on my phone because of
The newer OS versions are *really* good. You should consider them. :)
*ASB *(Find me online via About.Me http://about.me/Andrew.S.Baker/bio)
*Exploiting Technology for Business Advantage...
*
On Wed, Mar 16, 2011 at 5:47 PM, Jimmy Tran jt...@teachtci.com wrote:
Erik,
I rooted my
You beat me to that one.
Jon
On Wed, Mar 16, 2011 at 3:45 PM, Miller Bonnie L.
mille...@mukilteo.wednet.edu wrote:
Under control panel, Network Sharing Center, can you confirm that NIC
is actually using the domain profile and not a different one?
*From:* Ziots, Edward
That actually made me laugh out loud...
-Jeff Steward
On Wed, Mar 16, 2011 at 5:46 PM, Crawford, Scott crawfo...@evangel.eduwrote:
“Every time I’m listening to Sammy Hagar…”
*From:* Maglinger, Paul [mailto:pmaglin...@scvl.com]
*Sent:* Wednesday, March 16, 2011 4:37 PM
*To:* NT System
I'm here to serve :)
From: Jeff Steward [mailto:jstew...@gmail.com]
Sent: Wednesday, March 16, 2011 5:25 PM
To: NT System Admin Issues
Subject: Re: FW: Hacking Cars with MP3 Files
That actually made me laugh out loud...
-Jeff Steward
On Wed, Mar 16, 2011 at 5:46 PM, Crawford, Scott
On Wed, Mar 16, 2011 at 4:52 PM, Kurt Buff kurt.b...@gmail.com wrote:
What reason on Earth justified tying the music player to the vehicle
control systems?
In some cars, what used to be the radio is actually morphed into a
general-purpose interface for all sorts of things. The sales VP at
Thanks much for your first hand experience !
Erik Goldoff
IT Consultant
Systems, Networks, Security
' Security is an ongoing process, not a one time event ! '
From: Sam Cayze [mailto:sca...@gmail.com]
Sent: Wednesday, March 16, 2011 5:15 PM
To: NT System Admin Issues
Subject: RE:
Thanks, between here and another source, I think I’ve heard from about 8
folks that specifically mention the tethering benefit
Erik Goldoff
IT Consultant
Systems, Networks, Security
' Security is an ongoing process, not a one time event ! '
From: Jimmy Tran [mailto:jt...@teachtci.com]
Why are you modifying an in-box ADM as opposed to using your own?
Thanks,
Brian Desmond
br...@briandesmond.com
w – 312.625.1438 | c – 312.731.3132
-Original Message-
From: Christopher Bodnar [mailto:christopher_bod...@glic.com]
Sent: Wednesday, March 16, 2011 7:55 AM
To: NT System
Not sure why this is OT?
The authorization rules should be fine, but, I would stick with whatever you're
more comfortable with. Personally I don't advocate duplicating config in
multiple places as it becomes a support nightmare.
Thanks,
Brian Desmond
br...@briandesmond.com
w - 312.625.1438 |
On Wed, Mar 16, 2011 at 4:07 PM, G.Waleed Kavalec kava...@gmail.com wrote:
Due to a third party app we have some servers running W2K8 32-bit
SQL 2008 on said machines does not seem to want to use the full 16GB
Okay, this gets complicated. Some 'splaining is needed:
On any 32-bit x86
Ok here is what we found...
All of the workstation traffic for port 80 was getting timed out connecting to
an IP address. Turns out there is an agent on every workstation that does a
heartbeat check every 5 secs back to the main IP and every 5 mins to update
processor, memory, disk stats,
Turns out there is an agent on every workstation that does a heartbeat check
every 5 secs back to the main IP and every 5 mins to update processor,
memory, disk stats, etc
Lol, me thinks that setting was implemented by a software designer that never
scaled past his own devel box:)
~ Finally,
I think it was on Top Gear that they showed when using the Nav in the Audi,
if you touch a climate control, the display switches from the Nav map to
Climate settings - whether you want it to or not.
--
ME2
On Wed, Mar 16, 2011 at 3:54 PM, Ben Scott mailvor...@gmail.com wrote:
On Wed, Mar
2 things to take into account:
a) You'll probably want IE9 anywhere you'll have them browsing the web,
even on servers. Where might you want end users on a server?
Terminal Services/Remote Desktop Services
Citrix Presentation Server/XenApp/whatever they call it these days
b) Some application
Does anyone have suggestion on a site, course, material on reading in detail
the information you get from Wireshark. I see some huge potential in
diagnosing errors/issues but I will be honest and say that most of this is
quite hard to translate. Thx
Greg Sweers
CEO
ACTS360.com
P.O. Box 1193
Great stuff. Glad to hear you found the issue.
Wireshark has helped me many times. Sometimes you have to get down to
that layer to see what's really going on.
From: gswe...@acts360.com [mailto:gswe...@acts360.com]
Sent: Thursday, 17 March 2011 10:28 AM
To: NT System Admin Issues
1 - 100 of 104 matches
Mail list logo