I think it will end up becoming the norm though. IT is becoming
consumerised, and consumers drive the trends, like it or not.
The key is making sure you define how much of their environment you support
and make sure they know any support calls can be charged back to them if
they wantonly log
Exactly the same reason banks pay big bonuses - because they believe it
will attract the top staff and it's embedded in the culture. If that's
what they think it takes to make their business more successful, more
power to them. It's still a stupid thing to do technically, but the
only logic that
Tools come after acceptance. :)
If the trend doesn't stick, there'll be little demand for the tools and
they'll take longer to materialize, if ever.
Besides, this discussion is happening among the people who need to accept or
reject or otherwise acknowledge the trend vs the tool makers and
Exactly.
* *
*ASB* *http://XeeMe.com/AndrewBaker* *Harnessing the Advantages of
Technology for the SMB market…
*
On Wed, Oct 19, 2011 at 4:06 AM, James Rankin kz2...@googlemail.com wrote:
I think it will end up becoming the norm though. IT is becoming
consumerised, and consumers drive the
I've worked in places where dissolving agents for posture checking could be
used, and I've worked in (more) places where personal devices would never be
allowed to connect unless an SSL VPN were in place and wrapping up Citrix or
some other virtual desktop (ie. no connectivity back to the
IMO you should have a separate VLAN for BYO machines to connect to, and from
there hit some sort of gateway (like a Citrix web interface) that provides apps
and/or desktops running inside the perimeter. Managed correctly, you can allow
users to supply their own devices.
Sent from my POS
On Wed, Oct 19, 2011 at 5:58 AM, kz2...@googlemail.com wrote:
Managed correctly, you can allow users to supply their own devices.
No amount of firewall, gateway, VPN, client AV checking, etc., will
protect against a client device that is rootkit'ed deeply enough that
you can't detect anything
That could apply to any device on your LAN, although there is more of a risk
factor with devices that haven't been under your control, obviously.
Defense-in-depth is the only way to mitigate against the most insidious of
threats.
However, you are forgetting that Apple devices are immune to
Good morning folks,
We have a number of small branch offices (with more to come) that do not have
enough staff to warrant a full-time onsite IT presence. However, we do
occasionally need some IT work performed onsite. Services needed would be
anything that a basic Service Desk would do with
Ok,
I agree the 0 days are not the norm that folks are getting hit by,
although process procedures, patching and security hardening, isn't
going to stop an 0 day, because its something you don't have a
compensating control for, if you are using a specific piece of software
or OS that is
Been getting a few bits of consultancy work recently, and am getting a bit keen
to develop this a bit more. Are there any online resources or groups where you
can get more leads or openings for bits of consultancy work? Obviously I am in
contact with former workplaces and colleagues, using
I would assume that you would get the DNS settings from the DHCP scope,
and there is a dedicated DHCP scope for those coming in via the Cisco
VPN.
When you say DNS drops, do you not see it on an IPconfig /all or when
you try and ping the DNS servers they are not responding?
I got
Have you tried turning off UAC on the RDS?
On Wed, Oct 19, 2011 at 9:11 AM, David Lum david@nwea.org wrote:
I’m still trying to fix an app that works fine on 2003 Terminal Server but
not on RDS. To recap, the error message a user will get is “Run-time error
70 – access is denied”
**
I always use ProcMon for these issues. Find out what file or registry access is
causing the error.
http://technet.microsoft.com/en-us/sysinternals/bb896645
From: David Lum [mailto:david@nwea.org]
Sent: Wednesday, October 19, 2011 10:11 AM
To: NT System Admin Issues
Subject: 3rd party app
Try LUA BugLight as well. Or if you can, maybe try an App-V sequence of the
application.
Sent from my POS BlackBerry wireless device, which may wipe itself at any
moment
-Original Message-
From: Kennedy, Jim kennedy...@elyriaschools.org
Date: Wed, 19 Oct 2011 10:12:55
To: NT System
Everything on ipconfig looks normal, but when you're on a CMD windows and try
to resolve anything you can't it times out. Firewall rule isn't an option for
now, We did run wireshark , it seems DNS requests get sent , come back and then
windows 7 IP stack eat's them
When not on VPN, DNS works
Has any found a way to get the name to display like it did with the 2003 DNS
console on the reverse lookup zones? We have many reverse lookup zones so the
in-addr.arpa format is not very fun to sort and search through to find a
particular zone, since it is in reverse order. It was nice in
It seems as though your reverse lookup zones are configured individually.
If you create the zones at the highest levels only (10.in-addr.arpa) then
the other octets will show up in their own folders under this, and be more
easily sortable.
* *
*ASB* *http://XeeMe.com/AndrewBaker* *Harnessing
Not an option here. In many cases we have them down to the class C level some
are at the B level.
From: Andrew S. Baker [mailto:asbz...@gmail.com]
Sent: Wednesday, October 19, 2011 11:33 AM
To: NT System Admin Issues
Subject: Re: Win 2008 DNS console
It seems as though your reverse lookup
there's a point of reference here ... unless a zero day exploit is EXTREMELY
aggressive in propagating around the world ( and drawing even more attention
to its vector ) it will NOT be the most pervasive and therefore not the
largest cause of issues. Zero day exploits take time to propagate and
Why is it not an option?
I usually just setup reverse zones at the highest level possible and store
them on all DNS servers in the Forest -- at least for the private IP ranges.
* *
*ASB* *http://XeeMe.com/AndrewBaker* *Harnessing the Advantages of
Technology for the SMB market…
*
On Wed,
Too. Much. Free. Time.
* *
*ASB* *http://XeeMe.com/AndrewBaker* *Harnessing the Advantages of
Technology for the SMB market…
*
On Wed, Oct 19, 2011 at 1:14 PM, Orland, Kathleen korl...@rogers.comwrote:
http://www.neatorama.com/2011/10/18/steve-jobs-made-out-of-apples/
** **
**
In the Excel Object Model, it shows up as an OLE object; which isn't very easy
to deal with in scripting. Can it be done? I suspect so. Would it be easy? Not
a chance.
Regards,
Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com
From: Hilderbrand, Doug
Don't know your rate structure, but when I was starting out I used guru.com
quite a bit, and a little later, crossloop.com.
Regards,
Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com
-Original Message-
From: kz2...@googlemail.com
Long story, trust me it cannot be done due to having separate DNS masters for
AD and Linux. If I do the 10.0.0.0 reverse zone it would make AD authoritative
for the entire 10 class A so forwards to the Linux DNS would not happen and
reverse lookups would fail.
That aside, I still need to know
Good afternoon all,
Has anyone used the Storix backup solution? Good / Bad? Real world opinions
greatly appreciated!
TIA
Cameron
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
---
To manage subscriptions click
Never mind. Turns out it won't do what I require.
On Wed, Oct 19, 2011 at 2:21 PM, Cameron cameron.orl...@gmail.com wrote:
Good afternoon all,
Has anyone used the Storix backup solution? Good / Bad? Real world opinions
greatly appreciated!
TIA
Cameron
~ Finally, powerful endpoint
Of course I send this and then find it...thanks Mr. Hutchings! :)
Dave
From: David Lum [mailto:david@nwea.org]
Sent: Wednesday, October 19, 2011 1:41 PM
To: NT System Admin Issues
Subject: Script to fill in last user
One of you guys has a VBS script to populate the Description field in AD
How are you running this?
I would create a GPO and link to the OU you have the computers in. Under the
user config assign this as a login script and also enable loopback
processing for the GPO so it is applied to users.
On Wed, Oct 19, 2011 at 4:49 PM, David Lum david@nwea.org wrote:
OK
Ooo nice, totally overlooked the GPO potential on this
bad boy.
From: KenM [mailto:kenmli...@gmail.com]
Sent: Wednesday, October 19, 2011 1:59 PM
To: NT System Admin Issues
Subject: Re: Script to fill in last user - ok real Q this time.
How are you running this?
I would
If you get compromised by the zero day attack and sensitive
information is obtained by the attacking party
Then it is a reason to be concerned and probably important that you
address the situation and probably panic a little.
If you do not get compromised by the zero day attack
Then it is
I've tried LUA BugLight as well as Procmon, have I mentioned that even giving
said user local admin rights still generates this error?
From: kz2...@googlemail.com [mailto:kz2...@googlemail.com]
Sent: Wednesday, October 19, 2011 7:30 AM
To: NT System Admin Issues
Subject: Re: 3rd party app on
You'll need to give uses the rights to modify that field on all computer
objects they might log into.
From: David Lum [mailto:david@nwea.org]
Sent: Wednesday, October 19, 2011 4:01 PM
To: NT System Admin Issues
Subject: RE: Script to fill in last user - ok real Q this time.
72.4 seems a little low.
From: Erik Goldoff [mailto:egold...@gmail.com]
Sent: Wednesday, October 19, 2011 11:26 AM
To: NT System Admin Issues
Subject: Re: Zero-day bugs overrated, Microsoft says
there's a point of reference here ... unless a zero day exploit is EXTREMELY
aggressive in
How do know you haven't already been compromised by a 0day?
Seriously - how do you know?
On Wed, Oct 19, 2011 at 14:20, andy afo...@psu.edu wrote:
If you get compromised by the zero day attack and sensitive information is
obtained by the attacking party
Then it is a reason to be concerned
The same way Mac users know they haven't been infected with a virus.
-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com]
Sent: Wednesday, October 19, 2011 5:02 PM
To: NT System Admin Issues
Subject: Re: Zero-day bugs overrated, Microsoft says
How do know you haven't already
an overwhelming sense of smug?
-
Who'd you rather be, the Beatles or the Rolling Stones?
On Wed, Oct 19, 2011 at 15:05, Crawford, Scott crawfo...@evangel.eduwrote:
The same way Mac users know they haven't been infected with a virus.
-Original Message-
From: Kurt
Also, this:
http://www.thesun.co.uk/sol/homepage/news/3859348/Steve-Jobs-tribute-is-buil
t-from-Mac-parts.html
From: Orland, Kathleen [mailto:korl...@rogers.com]
Sent: Wednesday, October 19, 2011 12:14 PM
To: NT System Admin Issues
Subject: The *Original* Mac Daddy
Both pics are made from Apples...
From: Sam Cayze [mailto:sca...@gmail.com]
Sent: Wednesday, October 19, 2011 5:17 PM
To: NT System Admin Issues
Subject: RE: The *Original* Mac Daddy
Also, this:
http://www.thesun.co.uk/sol/homepage/news/3859348/Steve-Jobs-tribute-is-built-from-Mac-parts.html
Sounds like an issue with the VPN software to me. Have you tried Cisco
support and KB to see if there is something on this issue?
Jon
On Wed, Oct 19, 2011 at 10:49 AM, Garcia-Moran, Carlos
cgarciamo...@spragueenergy.com wrote:
Everything on ipconfig looks normal, but when you’re on a CMD
That was brilliant, lol :)
From: S Powell [mailto:powe...@gmail.com]
Sent: Wednesday, October 19, 2011 5:16 PM
To: NT System Admin Issues
Subject: Re: Zero-day bugs overrated, Microsoft says
an overwhelming sense of smug?
-
Who'd you rather be, the Beatles or the
And painfully true, denial isn't a river in Egypt.
John W. Cook
System Administrator
Partnership For Strong Families
5950 NW 1st Place
Gainesville, Fl 32607
Office (352) 244-1610
Cell (352) 215-6944
MCSE, MCP+I, MCTS, CompTIA A+, N+, VSP4, VTSP4
From: Sam Cayze [mailto:sca...@gmail.com]
On Wed, Oct 19, 2011 at 7:37 AM, James Rankin kz2...@googlemail.com wrote:
No amount of firewall, gateway, VPN, client AV checking, etc., will
protect against a client device that is rootkit'ed deeply enough that
you can't detect anything (or captured inside hypervisor-level
malware), but is
I think the answer is within your question test OU
csvde -d ou=Test, cn=main,dc=mydomain, dc=com -f c:\userexport.csv
Cheers,
~d
From: David Lum [mailto:david@nwea.org]
Sent: Wednesday, October 19, 2011 11:00 PM
To: NT System Admin Issues
Subject: CSVDE is killing me
This works
A HA! I feel so dumb but that was totally it, thanks!!!
Dave
From: daemonR00t [mailto:daemonr...@sysadmin-cr.com]
Sent: Wednesday, October 19, 2011 10:12 PM
To: NT System Admin Issues
Subject: RE: CSVDE is killing me
I think the answer is within your question test OU
csvde -d ou=Test,
Been there many times J
From: David Lum [mailto:david@nwea.org]
Sent: Wednesday, October 19, 2011 11:14 PM
To: NT System Admin Issues
Subject: RE: CSVDE is killing me
A HA! I feel so dumb but that was totally it, thanks!!!
Dave
From: daemonR00t
46 matches
Mail list logo