Techno Babble
It's all about technology! If technology is your thing use this forum to discuss anything tech related.
32,351 topics in this forum
-
Win2k8 Server: File disappears after making changes and saving it
by Guest JLawrence- 3 replies
- 89 views
I am running into a problem on a Windows 2008 server where a user has a folder that they are have full control over (They are not a local or domain admin). When the user saves a file in the folder, it disappears (from their view). However when I go in (I am a domain admin),I can see the file. I check the perms and they still have full access. If I reset the perms on the file, they see it again. But as soon as they save it, it disappears. What am I missing here. Is there something new in 2008 that I am overlooking with NTFS permissions? Something else I thought was odd is that I cannot set any permissions for "Creator Owner" on this folder. Once I …
-
Keeping it running sufficiently.
by Guest Omar123- 6 replies
- 96 views
When I first got my computer I didn’t realize how important having antispyware was to keeping it running sufficiently. However, it didn’t take very long for it to become perfectly clear. If you don’t have a good scan you will have many problems that could be avoided so easily. Search-and-destroy Antispyware is a great option when it comes to scanning for bugs that will help you keep your computer running at its peak efficiency. The antispyware solution from Search-and-destroy which you will find at _http://www.Search-and-destroy.com_ will help give your PC the protection it needs to keep it in good working condition.style_emoticons/ -- Omar123
-
Conficker - MS08-067
by Guest Charlie Moore- 11 replies
- 168 views
Does MS08-067 need to be reapplied to a Windows 2003 server when upgrading from SP1 to SP2?
-
Newfangled rootkits survive hard disk wiping
by Guest BoaterDave- 1 reply
- 94 views
This article http://www.theregister.co.uk/2009/03/24/pe..._bios_rootkits/ refers to "unfettered root access" Perhaps a silly question - if one connects to another server deliberately for the purpose of sending and receiving messages in a newsgroup (thus making a hole in one's defences?) might this be giving "unfettered root access" if one is operating with Administrator privileges? Always wondering! -- Dave (~BD~)
-
No password protection on a removed hard drive?
by Guest David- 3 replies
- 107 views
I am going to have some hardware repairs done on my laptop. In order to make sure I will not lose any data, I removed the hard drive from the laptop, put it into a hard drive enclosure, and connected it to a USB port on my desktop computer. I was able to back up all the HD data from the laptop onto the desktop. I was able to access the data for all users on the laptop without having to enter any user account passwords. Does this mean that if someone were to steal my laptop and they wanted to get access to the data for all my user accounts, all they would have to do is remove the HD, connect it to another computer, and then copy all unencrypted data? …
-
Password for Login
by Guest Froggie Gear- 6 replies
- 82 views
My son put a password to his login name, and did not write it down. Now we are unable in access it. There is no hint, is there anything I can do to buypass to get in?
-
Vista 64 Disk encryption?
by Guest victorabernard- 2 replies
- 99 views
Is Bitlocker available for Vist 64? If not does anyone know of any other full disk encryption software that supports Vista 64? -- victorabernard
-
what is the role of query in MS access?
by Guest kyungmin- 1 reply
- 101 views
what is the role of query in MS access?
-
top 5 contenders in adware/spyware removal!!
by Guest always.forever69@hotmail.com- 4 replies
- 113 views
90% of all computers are infected with adware or spyware. If you are one of that 90%. We've gathered the top 5 contenders in adware here just for you. Reviewed them, All have been Tested, Tons of Reviews with User ratings, Testimonials and Support. Best of all they are all FREE to try. They have tested hundreds of adware removal programs. Some of them work great, many simply don`t work.This is the answer to your problem. this is my blog if you have any questions http://circa2009adwarereview.blogspot.com/ top 5 contenders in ad ware and spyware removal adware http://tyler918.bezoogle.com/pp/adware/ spyware http://tyler918.bezoogle.com/pp/…
-
"Prevent plaintext PINs from being returned by credential manager"
by Guest Egil Martinsen- 0 replies
- 79 views
Hello, I have three questions regarding the GPO setting "Prevent plaintext PINs from being returned by credential manager" do? It is found under Computer Configuration -> .. -> ADMX -> Windows Components -> Smartcard. 1. The explanation found in the group policy editor states that: "If you enable this setting, credential manager does not return a plaintext PIN". The question is then: To whom will it not return a plaintext PIN? To the LSA? To the BaseCSP? To a random user asking for it? 2. When this setting is enabled, what encryption algorithm is used on the PIN, and what key is used? 3. When this setting is enabled, smartcard login wor…
-
You Tube videos not playing w Parental Control
by Guest samnewbie- 8 replies
- 198 views
Hello. Just got new computer with Vista Home Premium. Have set parental controls to medium for my son. I am the administrator. If I go on "You Tube" I can see the videos and hear the music = it all works fine. However, if my son goes on you Tube he cannot see the videos/hear the music even though I have put "You Tube" in as an allowed website in Parental Controls. All he gets is the little circle (or timer) as though it is looking for the relevant video but, even if we wait ages, the video never appears. I have tried unchecking the "enable hardware acceleration" as per another post on this site but that made no difference. I'd be grateful for a…
-
What are Vista essential services
by Guest DavidOsburn- 2 replies
- 107 views
As a former data protection professional, I have always lived by the addage that the first thing you want to do to secure a system is to turn off all non-essential services. Msft has always been famous for not giving very good descriptions of their services. Phrases like "required for system to function" are common. Can anyone provide a realistic list of Vista services and what they actually do, so a user can determine if they are needed for the type of operation they are doing? -- DavidOsburn DavidOsb Retired M-Softie
-
DATA EXECUTION PREVENTION
by Guest espman2- 2 replies
- 126 views
Hi, I have been having trouble booting up. I get a block that says DATA EXECUTION PREVENTION has shut down DOS % FILE COMPARE Utility. If I click on close message, my wallpaper comes up, but no icons. I can not access any of my programs. Can I disable it or fix it somehow? Thanks.
-
Malicious software removal tool crashes
by Guest Bodmass- 13 replies
- 247 views
I've been investigating an "NT Authority system" error message I get that restarts my system with error code 1073741819. This led me to believe I have a sasser infection in my system, which in turn led me to download the malicious software removal tool. Unfortunately (just as the McAffee stinger tool did), this has twice merely closed down during the scan. What it gives me is an exception report that starts thus Exception information Code: 0xc0000005 Flags 0x00000000 Record 0x0000000000000000 Address: 0x000000005a380c1c and goes on to list aprox 100 modules. (my PC has been giving me this error message from a wh…
-
Free European Girls Chat
by Guest Picasa- 0 replies
- 84 views
English - Germany - Czech @ @ Normal IDD call applied. +420 605 233233
-
Windows Defender automatically keeps turning off...
by Guest Cuzz- 3 replies
- 116 views
It keeps automatically turning off unexpectedly, I am using Windows Vista Home Basic, I also have Windows Live Onecare, it keeps doing this for some reason and when I try to do full scan in Defender, I get an error. The problem just occured this morning...help -- Cuzz
-
Malware and Botnets
by Guest ~BD~- 1 reply
- 244 views
If you were unable to view the BBC programme using iPlayer, you may be able to watch extracts here: http://www.sophos.com/blogs/gc/g/2009/03/1...otnet-send-spam HTH -- Dave
-
- 1 reply
- 82 views
We have a windows 2003 standalone server that is not part of a domain. The box will sit in a DMZ location acting as a web server. What level of access does an account need if they require remote access to the application, security and system event logs? I want to restrict an account from having admin permissions to the system. In the local securiyt policy, the options are set to restrict guests from accessing the logs. We are using a 3rd party application that connects and downloads the log information on a regular basis and really would like to restrict the level of access this account requires in order to connect and download these logs. Thanks in adv…
-
Degree
by Guest Yba- 2 replies
- 98 views
Hi, This might be not the proper place to post this inquiry. But, as there are those beautiful and experienced MVP's around, I hope they can attend this inquiry. I have been in IT field for the past 5 years, mainly in networking. I have been working with DCs, ISA, Exchange and Citrix. I could say that I have a fair background of networking. Now, assuming that there is an academic degree for network security from Microsoft perspective, what would the courses of that degree be? I mean, what books should I master to master Microsoft network security? Any input is highly appreciated. Thanks Yba
-
- 3 replies
- 99 views
We have a Windows 2003 server that will be placed in DMZ as a standalone server with IIS for webpage. One of the vulnerabilities identified is the permission settings on the IISADMPWD. It's recommended that if the directory cannot be removed, then modify the permissions so that only the Administrators & System have access to this folder. I noticed the Power Users & Users group had access to this folder but were inherited from the \system32\ folder. I removed the Power Users group from \system32\ as their are no local user accounts in that group. However,when I look at the Users group, I see the ASPNet, NT Authority\Authenticated Users, NT Authori…