np - I understand.  I also meant my response to be
"walkthrough/copy/boilerplate".  Of course you want a very carefully
crafted response to customer issues such as these. In some cases it
simply cannot be explained to a customer, and you have to walk them
through a visualization of their issue.

--
ME2



On Tue, Nov 4, 2008 at 1:13 PM, David McSpadden <[EMAIL PROTECTED]> wrote:
> Sorry for the smart @$$ remarks.  I am not supposed to create single
> instance answers.  I am supposed to create generic answers for a broad
> array of problems and then narrow them down.  Mostly I am not supposed
> to talk with the customer's just keep our internal network up and
> running.  Let the support staff help the customers with problems like
> these.
>
> -----Original Message-----
> From: Micheal Espinola Jr [mailto:[EMAIL PROTECTED]
> Sent: Tuesday, November 04, 2008 1:13 PM
> To: NT System Admin Issues
> Subject: Re: Odd Redirects
>
> +1
>
> --
> ME2
>
>
>
> On Tue, Nov 4, 2008 at 1:07 PM, Troy Meyer <[EMAIL PROTECTED]>
> wrote:
>> Are we missing something here, what exactly are you asking?  Are all
> of your clients unable to access the site?  Then you are obviously
> looking at a higher level issue with name resolution and you need to
> check out your internal dns servers.  Launch an nslookup and see what ip
> it responds to for that server.  Then change the server in nslookup to
> 4.2.2.1 and try again.
>>
>> If only one user is having the issue can you walk them through
> checking for entries in the c:\windows\system32\drivers\etc\hosts file.
>>
>> If you wanted to script the checking of that hosts file for entries,
> you certainly could, but is it worth it for one user?  Will it solve a
> malware issue that added invalid entries into a host file?
>>
>> Unfortunately I don't think there is a fix all script out there that
> magically detects the issue and resolves the problem, if there was, we
> all would be doing something else.
>>
>> -troy
>>
>> -----Original Message-----
>> From: David McSpadden [mailto:[EMAIL PROTECTED]
>> Sent: Tuesday, November 04, 2008 9:58 AM
>> To: NT System Admin Issues
>> Subject: RE: Odd Redirects
>>
>> Maybe.  I have 35k+ customers. I am looking for something scripted for
>> the front line Service Reps to give them.  And you PC has been jacked
>> isn't one of the things my customers like to hear...
>> :-)
>>
>> -----Original Message-----
>> From: Micheal Espinola Jr [mailto:[EMAIL PROTECTED]
>> Sent: Tuesday, November 04, 2008 1:00 PM
>> To: NT System Admin Issues
>> Subject: Re: Odd Redirects
>>
>> A walk-through?
>>
>> --
>> ME2
>>
>>
>>
>> On Tue, Nov 4, 2008 at 12:48 PM, David McSpadden <[EMAIL PROTECTED]>
>> wrote:
>>> How do I explain that to joe user?
>>>
>>>
>>>
>>> ________________________________
>>>
>>> From: Sean Rector [mailto:[EMAIL PROTECTED]
>>> Sent: Tuesday, November 04, 2008 12:40 PM
>>> To: NT System Admin Issues
>>> Subject: RE: Odd Redirects
>>>
>>>
>>>
>>> Check 4 hosts file?  DNS poisoning...
>>>
>>>
>>>
>>> Sean Rector, MCSE
>>>
>>>
>>>
>>> From: David McSpadden [mailto:[EMAIL PROTECTED]
>>> Sent: Tuesday, November 04, 2008 12:27 PM
>>> To: NT System Admin Issues
>>> Subject: Odd Redirects
>>>
>>>
>>>
>>> I have a customer that is trying to get to www.imcu.org.  They are
>> getting
>>> redirected to www.manta.com.
>>>
>>> If the go to www.imcu.com they are fine.  I can get to both .org and
>> .com
>>> with no issues.
>>>
>>> What is redirecting them to manta.com? What can I tell them to do to
>> stop
>>> this behavior?
>>>
>>> So far I have told them to delete temporary files and cookies as well
>> as
>>> ipconfig /flushdns but what
>>>
>>> is the real problem with their pc???
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> Data Security is everyone's responsibility.
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> Information Technology Manager
>>> Virginia Opera Association
>>>
>>> E-Mail:         [EMAIL PROTECTED]
>>> Phone:        (757) 213-4548 (direct line)
>>> {*}
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to