The BigE.
;-)
They about lost their minds with I took in off the desktops and made
them look for it in Programs.


It's good to be the King...

-----Original Message-----
From: Troy Meyer [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, November 04, 2008 1:21 PM
To: NT System Admin Issues
Subject: RE: Odd Redirects

It's all good.

What is funny is the solution is going to be having the user stop typing
in the address wrong or stop using an HTML link that is outdated.  It's
always those little things that we take for granted.

Geez we still get calls that the "Big Blue E" is broken.


-troy

-----Original Message-----
From: David McSpadden [mailto:[EMAIL PROTECTED]
Sent: Tuesday, November 04, 2008 10:13 AM
To: NT System Admin Issues
Subject: RE: Odd Redirects

Sorry for the smart @$$ remarks.  I am not supposed to create single
instance answers.  I am supposed to create generic answers for a broad
array of problems and then narrow them down.  Mostly I am not supposed
to talk with the customer's just keep our internal network up and
running.  Let the support staff help the customers with problems like
these.

-----Original Message-----
From: Micheal Espinola Jr [mailto:[EMAIL PROTECTED]
Sent: Tuesday, November 04, 2008 1:13 PM
To: NT System Admin Issues
Subject: Re: Odd Redirects

+1

--
ME2



On Tue, Nov 4, 2008 at 1:07 PM, Troy Meyer <[EMAIL PROTECTED]>
wrote:
> Are we missing something here, what exactly are you asking?  Are all
of your clients unable to access the site?  Then you are obviously
looking at a higher level issue with name resolution and you need to
check out your internal dns servers.  Launch an nslookup and see what ip
it responds to for that server.  Then change the server in nslookup to
4.2.2.1 and try again.
>
> If only one user is having the issue can you walk them through
checking for entries in the c:\windows\system32\drivers\etc\hosts file.
>
> If you wanted to script the checking of that hosts file for entries,
you certainly could, but is it worth it for one user?  Will it solve a
malware issue that added invalid entries into a host file?
>
> Unfortunately I don't think there is a fix all script out there that
magically detects the issue and resolves the problem, if there was, we
all would be doing something else.
>
> -troy
>
> -----Original Message-----
> From: David McSpadden [mailto:[EMAIL PROTECTED]
> Sent: Tuesday, November 04, 2008 9:58 AM
> To: NT System Admin Issues
> Subject: RE: Odd Redirects
>
> Maybe.  I have 35k+ customers. I am looking for something scripted for
> the front line Service Reps to give them.  And you PC has been jacked
> isn't one of the things my customers like to hear...
> :-)
>
> -----Original Message-----
> From: Micheal Espinola Jr [mailto:[EMAIL PROTECTED]
> Sent: Tuesday, November 04, 2008 1:00 PM
> To: NT System Admin Issues
> Subject: Re: Odd Redirects
>
> A walk-through?
>
> --
> ME2
>
>
>
> On Tue, Nov 4, 2008 at 12:48 PM, David McSpadden <[EMAIL PROTECTED]>
> wrote:
>> How do I explain that to joe user?
>>
>>
>>
>> ________________________________
>>
>> From: Sean Rector [mailto:[EMAIL PROTECTED]
>> Sent: Tuesday, November 04, 2008 12:40 PM
>> To: NT System Admin Issues
>> Subject: RE: Odd Redirects
>>
>>
>>
>> Check 4 hosts file?  DNS poisoning...
>>
>>
>>
>> Sean Rector, MCSE
>>
>>
>>
>> From: David McSpadden [mailto:[EMAIL PROTECTED]
>> Sent: Tuesday, November 04, 2008 12:27 PM
>> To: NT System Admin Issues
>> Subject: Odd Redirects
>>
>>
>>
>> I have a customer that is trying to get to www.imcu.org.  They are
> getting
>> redirected to www.manta.com.
>>
>> If the go to www.imcu.com they are fine.  I can get to both .org and
> .com
>> with no issues.
>>
>> What is redirecting them to manta.com? What can I tell them to do to
> stop
>> this behavior?
>>
>> So far I have told them to delete temporary files and cookies as well
> as
>> ipconfig /flushdns but what
>>
>> is the real problem with their pc???
>>
>>
>>
>>
>>
>>
>>
>>
>>
>> Data Security is everyone's responsibility.
>>
>>
>>
>>
>>
>>
>>
>>
>>
>> Information Technology Manager
>> Virginia Opera Association
>>
>> E-Mail:         [EMAIL PROTECTED]
>> Phone:        (757) 213-4548 (direct line)
>> {*}
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to