|
David: Seriously, your best bet may be an independent
consultant. This is for a variety of reasons: --) Independent consultant is not aware of
any internal company politics, so that’s not a factor should you end up
prosecuting the offender; --) Consultant may have expertise in this
area that you don’t (evidence collection.) --) Once Lastly, breaching a computer system (in
most cases) is a Just my thoughts, JJ -----Original Message----- Dear all, We have a NT
network that was hit the other day, in the sense that it was remotely shutdown
by an individual somehow. The person might have the passwords and also sound
technical expertise in remote utilities. Is there a way for me to trace where
the traffic was coming from that day and what IP address? Also, is there a way
to automatically capture the screen if it was remotely controlled? Please advise,
thanks in advance. Sincerely, David Ng |
- Please assist, tracking or IDS options. David Ng
- RE: Please assist, tracking or IDS options. Joe Vasquez
- Re: Please assist, tracking or IDS options. Ron DuFresne
- Re: Please assist, tracking or IDS options. Rick Murphy
- RE: Please assist, tracking or IDS options. J
- RE: Please assist, tracking or IDS options. Patrick Orzechowski
- Re: Please assist, tracking or IDS option... Josh Welch
- RE: Please assist, tracking or IDS options. Clark, Steve
- RE: Please assist, tracking or IDS options. Jehad
- RE: Please assist, tracking or IDS options. Jason Robertson
