Jump to content

CptMurphy

Member
  • Posts

    531
  • Joined

  • Last visited

  • Donations

    0.00 USD 
  • Country

    United States

Posts posted by CptMurphy

  1. I'm running Windows XP Home Edition with a Netgear wireless router. Periodically--once a day or two-- I lose connectivity to the internet. Running xpnetdial fixes the problem.

    The log states that the system has a corrupted IP Routing Table and invalid ARP Cache entries.

    How can I fix this permanently so I don't have to run the diagnostic software frequently?

    Thanks.

    Are you checking the log on the router or the PC. If it's on the PC go to the command prompt>type in arp -d *. This deletes all the arp tables. If it's on the router, you should probably reset it. If it keeps happening, your router might be messed up.

  2. I've been looking for the better part of my day and all I've found are slideshow screensaver with pictures of stars, galaxies and whatnot; or screensavers with spyware/adware injected in it. I'm wondering if anyone has seen or used a screensaver of a galaxy in motion? Any help is appreciated.

    EDIT: BTW, sorry if this doesn't go here, just couldn't really make it fit anywhere else.

  3. So we kinda need a PC auditor that's free-for-corporate use. I was wondering if anyone here knows of a good one. The only ones I could find that pretty much meet our expectations is belarc but that's free for personal use. I'm mainly looking for info on what printers are installed, what software is installed, the last user logged in... standard stuff. Also, if anyone knows of a way to code all of this I'd appreciate any help. Thanks.

  4. Straight from M$:

    1. Click Start, and then click Control Panel.

    2. In Control Panel, click Performance and Maintenance, click Administrative Tools, and then double-click Local Security Policy.

    3. Under Local Policies\Security Options, and then double-click Network Access: Let Everyone permissions apply to anonymous users.

    4. Click Enabled, and then click OK.

  5. "I deleted a bunch of files on my PC because it needed more room. Now my PC doesn't work. I have a meeting in 15 minutes so you have to fix it now."

    "OK, here's a new laptop/PC. You'll have to reconfigure it, and next time, ask me to delete the files please. Thank you."

    If only life was that simple. :}

    +1. Many users don't believe in "Sorry, there's nothing I can do."

  6. What printer are you using? The tab you should be looking for, depending on how you installed the printer, is Device Settings in the printer's properties box. Or, go into word, file>page setup>paper. Change the paper there then click the Default button. Click yes or ok when it pops up and that should be it.

  7. Where are these logs located?

    I'm interested to find out.

    start => run (or command prompt) eventvwr.msc

    Look for the log file which say:

    Hacker attached to system and the date and time, then look for the entry of:

    Hacker detached from system and the date and time.

    Obviously if someone where to enter the guys machine they would probably have enough nohow of how to clear any evidence of their being there.

    Well actually if he assumes he's been hacked that means that there was some change made which would lead someone to believe that the user who accessed his account was either sloppy or a script kiddie. That would lead the same person to believe that the user who accessed said system forgot to, or didn't know how to alter the logs. Simple logic at work.

    Tubui and spacesurfer,the log that you would look for is in Even Viewer>click Security. Depending on what rights you have, you may not be able to see what's in this log. What you are looking for is any consecutive "Failure audit" followed by a success audit. Double-click one to see what user was trying to login. As general practice, after about 3 failed attempts suspicious should start. Moreso if they where able to login after that.

  8. some tips for you...

    1) lock down workstations through group policy

    2) lock down access to files through ntfs permissions

    3) ensure some sort of redunandcy (with multiple DC's, DNS and DHCP servers)

    4) immunize and protect all the pcs from spyware and viruses

    5) filter the internet connection using a firewall with content filtering

    6) ensure backups are good, either through verification or manual testing once a week <- i cannot stress how important this is, either a user will loose a file and you will have to get it back or worse a server will die and you will have to restore the whole thing from scratch

    thats all i can think of from the top of my head, having just this minute got up. But seriously your one lucky guy to be landing a job like that with little experience, just use books, technet, google and this forum to learn as much as possible.

    good luck

    I have to say something about locking down systems. As long as you make the end users regular users, there's no need to lock anything down. I can't say how many times we've had issues with locked down systems. If we can't unlock it, we just reimage to XP.

×
×
  • Create New...