Doesn't the fact that there is no consistency in the data from systems
placed at different points in your network *helpful* to determining where
there is a potential slowdown?
Users complain about slow performance, and your logging shows that
speeds outside are faster than those inside.
This
I would recommend that fiddler HTTP proxy be added to 2 representative
workstations, going to the same website, one outside and one inside, and
look at the traffic dump to see where things might be slowing down, its
saved me a lot of work in the past, either verifying there is a web
problem, or
I did...once I d/led a QR reader to it...because I just *had* to find out!
LOL! T'was the first time I've seen it used in an email.
Cheers!
On Thu, Jun 9, 2011 at 1:56 AM, Ben Schorr b...@rolandschorr.com wrote:
Just use your smartphone. :-)
Ben M. Schorr
Chief Executive Officer
Wow, well I'm afraid it probably wasn't worth all THAT effort, but now
you've got the reader on your smartphone and you'll undoubtedly find
lots of better uses for it. J
Ben M. Schorr
Chief Executive Officer
__
Roland Schorr Tower
Google's Gmail + Facebook = 'Probabality index database'(how likely
you are to be up to something no good)
Public cameras + Face reconization + 'Probabality index database' =
Police knowing who to watch
1984
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~
The change to ProfilesDirectory _should_ only affect _new_ profiles.
Off the top of my head, I cannot think of any caveats to your 2nd question
beyond the usual YMMV, don't call me I'll call you and if anything breaks it
is all Gary Slinger's fault.
Carl Webster
Consultant and Citrix
I'd be willing to bet some trashy app has the path to the user's profile
hard-coded somewhere. Might be worth running some ProcMon instances against
your key apps if it's really vital.
On 9 June 2011 15:24, Webster carlwebs...@gmail.com wrote:
The change to “ProfilesDirectory” _*should*_ only
Sorry, thought you were implying you had used it before or knew something about
it.
Jay Dale
Senior Systems Administrator
p:281-574-2414
From: Erik Goldoff [mailto:egold...@gmail.com]
Sent: Monday, June 06, 2011 7:49 PM
To: NT System Admin Issues
Subject: RE: Image Editing software
It's just
We had ittermittant slowness during one period. Then we discovered a dev
who would at random times during the day copy 800GB-1.5TB files across the
network.
Just a thought.
On Thu, Jun 9, 2011 at 5:36 AM, Ziots, Edward ezi...@lifespan.org wrote:
I would recommend that fiddler HTTP proxy be
On Thu, Jun 9, 2011 at 10:16 AM, Jon D rekcahp...@gmail.com wrote:
Google's Gmail + Facebook = 'Probabality index database'(how likely
you are to be up to something no good)
Public cameras + Face reconization + 'Probabality index database' =
Police knowing who to watch
What makes you think
On Thu, Jun 9, 2011 at 10:30 AM, James Rankin kz2...@googlemail.com wrote:
I'd be willing to bet some trashy app has the path to the user's profile
hard-coded somewhere.
I know Windows Media Player does/did this. The trashy apps come
with the computer. ;)
-- Ben
~ Finally, powerful
Wow and I thought I was the only one who ran into an issue like that...
J
More than once.
Don Guyer
Windows Systems Engineer
RIM Operations Engineering Distributed - A Team, Tier 2
Enterprise Technology Group
Fiserv
don.gu...@fiserv.com
Office: 1-800-523-7282 x 1673
Fax:
How the hell did you figure that one out?
Dave
From: Steven Peck [mailto:sep...@gmail.com]
Sent: Thursday, June 09, 2011 7:39 AM
To: NT System Admin Issues
Subject: Re: OTish: Need some ideas on troubleshooting web browsing problem
We had ittermittant slowness during one period. Then we
Speaking for my cases.
We had the help of our Network Team. Narrowed it down to Port, then
computer.
Then a personal visit to the employees desk took care of the rest.
J
Don Guyer
Windows Systems Engineer
RIM Operations Engineering Distributed - A Team, Tier 2
Enterprise
By network access and sharing, I mean that all the photos are located on a
network share and multiple computers need to be able to access them and make
changes and update them. Using PS Elements they can't use multiple machines
because it does not update any changes made by another user.
Jay
What model and how old is your BC Web filter?
-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com]
Sent: Thursday, June 09, 2011 12:13 AM
To: NT System Admin Issues
Subject: OTish: Need some ideas on troubleshooting web browsing problem
All,
I'm in need of a new approach to
We had similar method. In this case, the data was crossing out of a smaller
environment which was using an older switch and then hiting one of the core
routers and some interaction there had really negative effect which made the
problem worse then it should have been. They had agreed when the
By network access and sharing, I mean that all the photos are located on a
network share and multiple computers need to be able to access them and make
changes and update them. Using PS Elements they can't use multiple machines
because it does not update any changes made by another user.
Jay
Wouldn't Picasa pretty much handle your needs? You don't want the files
opened for editing by more than one person at a time (first person can edit,
2nd is read-only sort of thing). If they are on a share, then everyone
should be able to access the latest versions?
Am I missing something here?
By network access and sharing, I mean that all the photos are located on a
network share and multiple computers need to be able to access them and make
changes and update them.
Okay, photos on a read/write share. No problem there.
Using PS Elements they can't use multiple machines
because
Hi all,
On June 14, 2011 Microsoft is planning to release sixteen (16) new
security bulletins.
The June 2011 Advance Notification Summary page is at
http://www.microsoft.com/technet/security/bulletin/ms11-jun.mspx.
==
NEW SECURITY BULLETIN SUMMARY
Some alarm bells are going off. If there's a professional service involved,
why are you doing anything? Have you asked them what they would suggest so
you could do your own analysis?
On Thu, Jun 9, 2011 at 1:24 PM, Jonathan ncm...@gmail.com wrote:
for those of you you do not have content
+1
If you need to preserve for a professional you need them to tell you how to do
it in conjunction with the lawyers that might be involved. They may very well
tell you first thing to do is image it. I was an 'expert' witness in a sexual
harassment case that the company lost badly because they
Hi -
I have inherited an issue and need some help with it... Wondering if anyone
else has some ideas on what to try.
I have a remote site, which includes 7 2000/XP desktops and it is connected
via VPN tunnel. Each user has told me their login and logout takes
forever. I've timed it and it's
D:
Remove roaming profiles (because you have a mixed 2k/XP environment, and if
they move around they might be subject to profile corruption when moving
from OS to OS) and keep redirecting My Documents.
On Thu, Jun 9, 2011 at 1:36 PM, Kelli Sterley kjsterley.li...@gmail.comwrote:
Hi -
I have
The second you log on as an Admin files have changed. If there are Legal
discoveries then the evidence is tainted. Forensic specialists clone the HD
with a special setup and do discovery on the clone thus preserving the original
for evidence.
From: Jonathan Link
Good points from all of you. I don't know that a third party will be brought
in at all, but want to be prepared in case it does turn into something
bigger, which is why I asked the list.
What would you guys recommend for cloning for this purpose? The last thing I
used was Ghost, but have used
Built-in backup program.
Don Guyer
Windows Systems Engineer
RIM Operations Engineering Distributed - A Team, Tier 2
Enterprise Technology Group
Fiserv
don.gu...@fiserv.com
Office: 1-800-523-7282 x 1673
Fax: 610-233-0404
www.fiserv.com http://www.fiserv.com/
From: Jonathan
If there's a chance it turns into something bigger, I'd hold off doing
anything. I'd unplug the computer and lock it in a safe and leave it alone.
I'd talk to your superiors about being able to maintain the integrity of the
machine being paramount if they think that this will involve litigation
Just say no.
To do this properly you cannot boot from that drive. A proper forensic
image is taken by placing the disk in another machine with adequate write
protection in place. Once the image is taken the original is placed in
secure storage. If you do anything, and it goes to a legal
Honestly, I would (if possible) pull the machine out from under the user (make
up some excuse about warranty issue or something) wrap it in tape so the case
can't be cracked and have someone sign it and date it for future reference.
From: Jonathan [mailto:ncm...@gmail.com]
Sent: Thursday, June
There are a lot of corps that need to read this and take it to heart - but
particularly DELL -
http://docs.media.bitpipe.com/io_25x/io_25805/item_399595/19613_WhyPerformanceMatters_WP.pdf
Shauna Hensala
Date: Thu, 9 Jun 2011 14:01:09 -0400
Subject: Re: RE: windows 7 forensics
From:
understand and agree. However, if the boss says, do it anyway, what
approach would you use?
Jonathan A+, MCSA, MCSE
Thumb-typed from my HTC Droid Incredible (and yes, it really is) on the
Verizon network. Please excuse brevity and any misspellings.
On Jun 9, 2011 2:07 PM, John Cook
Boot it from a CD and image it then do your poking around.
From: Jonathan [mailto:ncm...@gmail.com]
Sent: Thursday, June 09, 2011 2:15 PM
To: NT System Admin Issues
Subject: Re: RE: RE: windows 7 forensics
understand and agree. However, if the boss says, do it anyway, what approach
would you
I would beg him to contact a lawyer before proceeding. If that doesn't get
anywhere, I'd ask for a signed letter indemnifying me of responsibility
should this proceed to litigation.
First thing is to tell the boss that this is not a technical problem. It is
a legal issue. A legal issue that
Perfect!
Send to:
prem...@dell.com
global_b2b_supp...@dell.com
Dear Dell,
Please fix Premier or I am going elsewhere. See attached.
Thanks,
Your customer [in peril]
From: Shauna Hensala [mailto:she...@msn.com]
Sent: Thursday, June 09, 2011 1:14 PM
To: NT
Sector by Sector image, and again as Robert said write-protections
should be in place, unless your want a lawyer basically shooting a big
hole in your chain of evidence/custody that is required to even get the
evidence in a court of law. Best to leave the Forensics to a reputable
out-sourced
x2
In the past when I was approached about doing this type of
investigating, I made sure someone else was able to access the
system to do the investigating (HR or a superior).
I never agree(d) to do this stuff myself and was never forced to do so
or reprimanded in any way.
Don Guyer
They don't usually edit at the same time, but they want to be able to see the
changes made by another user from another workstation so that they don't do
double-editing.
Jay Dale
Senior Systems Administrator
P:281-574-2414
From: Cameron [mailto:cameron.orl...@gmail.com]
Sent: Thursday, June
Get it in writing for CYA.
From: Jonathan [mailto:ncm...@gmail.com]
Sent: Thursday, June 09, 2011 2:15 PM
To: NT System Admin Issues
Subject: Re: RE: RE: windows 7 forensics
understand and agree. However, if the boss says, do it anyway, what approach
would you use?
Jonathan A+, MCSA, MCSE
You can update the photos with Elements with one computer, but if you try to
edit them with another computer running Elements, it does not see the changes
made by the prior workstation. It only sees the changes that IT made. It's as
if there is a database of changes and settings per
Then this is likely a user issue or a machine configuration issue, having
them save changes locally rather than the network share. It's a behavioral
issue not a technical one.
On Thu, Jun 9, 2011 at 2:34 PM, Jay Dale jd...@unetek.com wrote:
They don’t usually edit at the same time, but they
Turns out we have a lawyer on the executive team. My instructions are to
clone and go from there.
Jonathan A+, MCSA, MCSE
Thumb-typed from my HTC Droid Incredible (and yes, it really is) on the
Verizon network. Please excuse brevity and any misspellings.
On Jun 9, 2011 2:37 PM, John Cook
I am wrong
It appears that it does keep a catalog of changes and keeps them on a single
computer.
There does appear to be a way to synchronize those changes, but looks like
it requires an Adobe service...
Might need to abandon Elements...
http://www.adobe.com/products/photoshopel/features/
Still get it in writing...
On Thu, Jun 9, 2011 at 2:48 PM, Jonathan ncm...@gmail.com wrote:
Turns out we have a lawyer on the executive team. My instructions are to
clone and go from there.
Jonathan A+, MCSA, MCSE
Thumb-typed from my HTC Droid Incredible (and yes, it really is) on the
Version Cue might work here. It should come with it although I am more a
Photoshop guy than an Elements guy is what you are looking for. You also need
to get the preferences set up right on each workstation so that the catalog
database is stored on the server and they all use the same path.
There are a few forensic sites that will help guide you. There are a few
software packages that have past court review to show that the original is
not changed in any way when making an image. Encase comes in mind but there
are others. Of course I can't remember them right now. A couple of them
G4L is a good app...
From: Jonathan [mailto:ncm...@gmail.com]
Sent: Thursday, June 09, 2011 1:56 PM
To: NT System Admin Issues
Subject: Re: RE: windows 7 forensics
Good points from all of you. I don't know that a third party will be brought
in at all, but want to be prepared in case it does
Do you have success logging turned on for the firewall? (Control panel, admin,
Windows firewall..., properties of the top node...)
From: James Rankin [kz2...@googlemail.com]
Sent: Wednesday, June 08, 2011 1:44 AM
To: NT System Admin Issues
Subject: Object
Anyone getting a lot of these. One of my techs just reported to me:
We have been getting hit by the Win 7 recovery virus today? Just as heads up
http://www.bleepingcomputer.com/virus-removal/remove-windows-7-recovery
We use Vipre here. Vipre can see it but obviously not stop it. Way to
3 computers today
John W. Cook
Systems Administrator
Partnership for Strong Families
From: Tom Miller tmil...@hnncsb.org
To: NT System Admin Issues ntsysadmin@lyris.sunbelt-software.com
Sent: Thu Jun 09 15:17:05 2011
Subject: Win 7 recovery virus
Anyone getting a
Sounds like possibly a new variant. If you have any samples please upload
them to our submit site.
http://www.sunbeltsecurity.com/threat
If you are also having the issue where all the files/folders are hidden
start menu icons, desktop icons missing - this page should help: (unless the
Please... :)
*ASB *(Professional Bio http://about.me/Andrew.S.Baker/bio)
Harnessing the Advantages of Technology for the SMB market...
On Thu, Jun 9, 2011 at 10:51 AM, Guyer, Don don.gu...@fiserv.com wrote:
Wow and I thought I was the only one who ran into an issue like that…
J
Potentially big month ahead...
*ASB *(Professional Bio http://about.me/Andrew.S.Baker/bio)
Harnessing the Advantages of Technology for the SMB market...
On Thu, Jun 9, 2011 at 1:29 PM, Ziots, Edward ezi...@lifespan.org wrote:
Hi all,
On June 14, 2011 Microsoft is planning to release
Hey all,
Our current remote support software sucks when the client is a win7 with
UAC. Handicapped to almost the point of useless.
What do you like that handles UAC in a way that makes remote support
feasible?
Bill
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~
Agreed, looks like that coupled with Oracle ( java) release is going to
keep folks busy.
Z
Edward E. Ziots
CISSP, Network +, Security +
Security Engineer
Lifespan Organization
Email:ezi...@lifespan.org
Cell:401-639-3505
From: Andrew S. Baker [mailto:asbz...@gmail.com]
Sent:
I've used Teamviewer in the past on my Win7 pc at home. It can also be
configured to only accept LAN connections.
Think it was about £1000 the last time I checked for unlimited end
connections.
Http://WWW.TeamViewer.com
T
Typed slowly on HTC Desire
On 9 Jun 2011 21:01, Bill Humphries
Logmeinrescue is working reasonably well for us with W7 and UAC...
***
Charlie Kaiser
charl...@golden-eagle.org
Kingman, AZ
***
-Original Message-
From: Bill Humphries [mailto:nt...@hedgedigger.com]
Sent: Thursday, June 09, 2011 1:01 PM
To:
That's the size of some of the dev's 'sample' datasets. They used to use
smaller ones but those wouldn't actually stress their apps anywhere near
close to what the production systems do which use larger datasets. This one
really doesn't eaither but at least it comes closer for testing before
I did, got it sorted with the follow-up mails I posted
Typed frustratingly slowly on my BlackBerry® wireless device
-Original Message-
From: Miller Bonnie L. mille...@mukilteo.wednet.edu
Date: Thu, 9 Jun 2011 12:15:24
To: NT System Admin Issuesntsysadmin@lyris.sunbelt-software.com
+1 on TeamViewer.
No issues answering UAC prompts etc.
We use it for customer support at work. (the quick support client is awesome
for those situations where you need in do whatever out not likely to be
a regular visit to that PC)
Tammy
_
From: Tony Patton
+1
*ASB *(Professional Bio http://about.me/Andrew.S.Baker/bio)
Harnessing the Advantages of Technology for the SMB market...
On Thu, Jun 9, 2011 at 1:41 PM, Jonathan Link jonathan.l...@gmail.comwrote:
D:
Remove roaming profiles (because you have a mixed 2k/XP environment, and if
they
+1000
It's as easy as an email to the principals stating:
-
As discussed, I will be creating a cloned copy of drive with serial
#xxx for use in our internal investigation. Please confirm that
you want me to lock the original in the safe, or provide it to legal
before I continue.
On Thu, Jun 9, 2011 at 2:56 PM, Kennedy, Jim
kennedy...@elyriaschools.org wrote:
But the bottom line is Adobe imaging products just don’t play well in a
network environment. They still strongly recommend against editing a file on
a server with Photoshop, they say copy it locally first.
This
On Thu, Jun 9, 2011 at 2:15 PM, Jonathan ncm...@gmail.com wrote:
understand and agree. However, if the boss says, do it anyway, what
approach would you use?
I would avoid MS Windows, as it has a tendency to want to write to
the disk without asking. (Due to things like updating the MBR for
Who needs more than 640K?
Regards,
Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com
-Original Message-
From: Ben Scott [mailto:mailvor...@gmail.com]
Sent: Thursday, June 09, 2011 6:34 PM
To: NT System Admin Issues
Subject: Re: Image Editing software
On
+1
-Original Message-
From: Charlie Kaiser [mailto:charl...@golden-eagle.org]
Sent: Thursday, June 09, 2011 1:10 PM
To: NT System Admin Issues
Subject: RE: remote support and UAC
Logmeinrescue is working reasonably well for us with W7 and UAC...
***
Charlie Kaiser
I used to live a fulfilled electronic life using a 1K ZX81
--Original Message--
From: Michael B. Smith
To: NT System Admin Issues
ReplyTo: NT System Admin Issues
Subject: RE: Image Editing software
Sent: 9 Jun 2011 23:45
Who needs more than 640K?
Regards,
Michael B. Smith
Consultant
Sounds more like you need a sharepoint type site so folks can ‘check out’
the graphic files to work on ONE AT A TIME …
I can’t think of any collaborative bitmap editors that are made for multiple
simultaneous users.
Erik Goldoff
IT Consultant
Systems, Networks, Security
' Security is
I survived on an IBM 360/25 with no fancy terminal thingy to get in my
way! Programming a punch card machine for IBM COBOL and Assembler code is
da bomb! :)
Webster
-Original Message-
From: Rankin, James R [mailto:kz2...@googlemail.com]
Subject: Re: Image Editing software
I used
Thanks again for the input.
Next question - what about USB flash drive forensics? I briefly scanned the
first part of this article, albeit form 2007
Would what you describe below still be valid for a USB flash drive?
Thanks,
Jonathan
On Thu, Jun 9, 2011 at 6:42 PM, Ben Scott
forgot to include the link:
http://www.ssddfj.org/papers/SSDDFJ_V1_1_Bem_Huebner.pdf
Jonathan
On Thu, Jun 9, 2011 at 8:43 PM, Jonathan ncm...@gmail.com wrote:
Thanks again for the input.
Next question - what about USB flash drive forensics? I briefly scanned the
first part of this article,
There are a lot of things to consider. The first being chain of custody, the
pulling of the pc with 2 people, and then certifying that it hasn't been
tampered with is your primary requirement.
After that I would let the real boys handle it (3rd party/legal team etc)
I went through something
73 matches
Mail list logo