rename the extension to .txt

this also prevents the user who receives it from accidentally running it via wscript.exe instead of opening it.

On Mar 11, 2004, at 10:17 AM, Lou Vega wrote:

<x-tad-bigger>OK – there are many, many virus alerts coming to me now based on a VBS file being zipped in my last e-mail. For those who can read the VBS, you’ll see that there is indeed NO virus.</x-tad-bigger>
<x-tad-bigger> </x-tad-bigger>
<x-tad-bigger>This brings up an interesting slightly OT question though:</x-tad-bigger>
<x-tad-bigger> </x-tad-bigger>
<x-tad-bigger>When you need to legitimately send a VBS file or other type file that is frequently targeted as a virus, what is a good and acceptable way to send it so that it doesn’t get blocked?</x-tad-bigger>
<x-tad-bigger> </x-tad-bigger>
<x-tad-bigger>Of course the double-edged sword there is that if legitimate users find a way to “safely” send such files, of course the bad guys will too.</x-tad-bigger>
<x-tad-bigger> </x-tad-bigger>
<x-tad-bigger>r/</x-tad-bigger>
<x-tad-bigger>Lou</x-tad-bigger>
<x-tad-bigger> </x-tad-bigger>
<x-tad-bigger> </x-tad-bigger>
<x-tad-bigger> </x-tad-bigger>
<x-tad-bigger>-----Original Message-----</x-tad-bigger>
<x-tad-bigger>From:</x-tad-bigger><x-tad-bigger> [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] </x-tad-bigger><x-tad-bigger>On Behalf Of </x-tad-bigger><x-tad-bigger>Lou Vega</x-tad-bigger>
<x-tad-bigger>Sent:</x-tad-bigger><x-tad-bigger> Thursday, March 11, 2004 10:01 AM</x-tad-bigger>
<x-tad-bigger>To:</x-tad-bigger><x-tad-bigger> [EMAIL PROTECTED]</x-tad-bigger>
<x-tad-bigger>Subject:</x-tad-bigger><x-tad-bigger> RE: [ActiveDir] Finding users who must change pw</x-tad-bigger>
 

<x-tad-bigger>Attached you’ll find a VB script written by Brad Sanford which I’ve used to generate user dumps before.</x-tad-bigger>
<x-tad-bigger> </x-tad-bigger>
<x-tad-bigger>One note with it – open it up and find the lines:</x-tad-bigger>
<x-tad-bigger>Domain = "YourDOmainGoesHere"</x-tad-bigger>
<x-tad-bigger>OutfileName = "c:\AllUsers.txt"</x-tad-bigger>
<x-tad-bigger> </x-tad-bigger>
<x-tad-bigger>On the domain = line put your domain name (i.e., “Microsoft” not “Microsoft.com”) and on the OutfileName= put the path to the file you want the results written to.</x-tad-bigger>
<x-tad-bigger> </x-tad-bigger>
<x-tad-bigger>Enjoy!</x-tad-bigger>
<x-tad-bigger>r/</x-tad-bigger>
<x-tad-bigger>Lou Vega</x-tad-bigger>
<x-tad-bigger> </x-tad-bigger>
<x-tad-bigger>-----Original Message-----</x-tad-bigger>
<x-tad-bigger>From:</x-tad-bigger><x-tad-bigger> [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] </x-tad-bigger><x-tad-bigger>On Behalf Of </x-tad-bigger><x-tad-bigger>Creamer, Mark</x-tad-bigger>
<x-tad-bigger>Sent:</x-tad-bigger><x-tad-bigger> Thursday, March 11, 2004 9:46 AM</x-tad-bigger>
<x-tad-bigger>To:</x-tad-bigger><x-tad-bigger> [EMAIL PROTECTED]</x-tad-bigger>
<x-tad-bigger>Subject:</x-tad-bigger><x-tad-bigger> [ActiveDir] Finding users who must change pw</x-tad-bigger>
 

<x-tad-bigger>I need to find which users have their accounts currently flagged to require a password change on next logon. Can that be done with dsquery user –stalepwd? If so, what value would I use? Or, is there a different solution I should be using?</x-tad-bigger>
<x-tad-bigger> </x-tad-bigger>
<x-tad-bigger>Thanks!</x-tad-bigger>
<x-tad-bigger> </x-tad-bigger>
Mark Creamer

Systems Engineer

Cintas Corporation

<x-tad-bigger>Honesty and Integrity in Everything We Do</x-tad-bigger>
 

Brent Westmoreland
BMW Group - Data Center Americas
Business: 864.989.6567

Reply via email to