Can’t help wondering if someone missed a Flash update

--
richard

From: [email protected] [mailto:[email protected]] On 
Behalf Of Ziots, Edward
Sent: Friday, October 04, 2013 8:00 AM
To: [email protected]
Subject: [NTSysADM] Adobe Customer Data breached

http://nakedsecurity.sophos.com/2013/10/04/adobe-owns-up-to-getting-pwned-login-and-credit-card-data-probably-stolen-all-passwords-reset/?utm_source=Naked+Security+-+Sophos+List&utm_medium=email&utm_campaign=93ed7d3d97-naked%252Bsecurity&utm_term=0_31623bb782-93ed7d3d97-454838729

Z

Edward E. Ziots, CISSP, CISA, Security +, Network +
Security Engineer
Lifespan Organization
[email protected]<mailto:[email protected]>
Work:401-255-2497


This electronic message and any attachments may be privileged and confidential 
and protected from disclosure. If you are reading this message, but are not the 
intended recipient, nor an employee or agent responsible for delivering this 
message to the intended recipient, you are hereby notified that you are 
strictly prohibited from copying, printing, forwarding or otherwise 
disseminating this communication. If you have received this communication in 
error, please immediately notify the sender by replying to the message. Then, 
delete the message from your computer. Thank you.
[Description: Description: Lifespan]


From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Webster
Sent: Friday, October 04, 2013 8:13 AM
To: [email protected]<mailto:[email protected]>
Subject: [NTSysADM] RE: Account Utility

Very few (of the sites I go to) ever look at the privileged accounts.  The last 
assessment I did had over 100 DA accounts and almost as many EA and SA 
accounts.  The majority of their service accounts were in all three groups!!!   
Until I ran MBS’ script, they had no idea how many local SQL Server and SQL 
Express installs had been done using the domain’s SQL Service account and that 
account was a member of all three privileged groups.


Webster

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Free, Bob
Sent: Thursday, October 03, 2013 11:52 PM
To: [email protected]<mailto:[email protected]>
Subject: [NTSysADM] RE: Account Utility

The first two I get, the third is really hard to comprehend.

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Webster
Sent: Thursday, October 03, 2013 8:09 AM
To: [email protected]<mailto:[email protected]>
Subject: [NTSysADM] RE: Account Utility

MBS’ script works like a charm.  I have used it when doing assessments for AD 
migrations.  I have NEVER seen an IT org that knew every service account used, 
where they were used or how many of those service accounts had domain admins 
privileges.

Webster


From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Michael B. Smith
Sent: Thursday, October 03, 2013 11:00 AM
To: [email protected]<mailto:[email protected]>
Subject: [NTSysADM] RE: Account Utility

http://theessentialexchange.com/blogs/michael/archive/2008/02/29/finding-services-using-non-system-accounts-with-powershell.aspx


From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Steve Norton
Sent: Thursday, October 3, 2013 8:10 AM
To: [email protected]<mailto:[email protected]>
Subject: [NTSysADM] Account Utility

A long time ago I used a utility that showed me what account services were 
running under on all my servers. My environment is Windows 2003 and 2008 R2. 
Ideally this would be a utility that I can run from a Windows 7 workstation 
against servers. Suggestions appreciated.

________________________________
PG&E is committed to protecting our customers' privacy.
To learn more, please visit http://www.pge.com/about/company/privacy/customer/
________________________________


The information contained in this e-mail, and any attachments hereto, is from 
The American Society for the Prevention of Cruelty to Animals® (ASPCA®) and is 
intended only for use by the addressee(s) named herein and may contain legally 
privileged and/or confidential information. If you are not the intended 
recipient of this e-mail, you are hereby notified that any dissemination, 
distribution, copying or use of the contents of this e-mail, and any 
attachments hereto, is strictly prohibited. If you have received this e-mail in 
error, please immediately notify me by reply email and permanently delete the 
original and any copy of this e-mail and any printout thereof.

<<inline: image001.jpg>>

Reply via email to