Jump to content

joeypesci

Active Members
  • Posts

    300
  • Joined

  • Last visited

  • Days Won

    4

Everything posted by joeypesci

  1. And they moaned at Gary McKinnon for breaking in all those years ago yet still haven't plugged the holes. Tits http://en.wikipedia.org/wiki/Gary_McKinnon
  2. joeypesci

    Legality

    Just curious to know what the legality is, of getting a phone off ebay, restoring the wiped SD card that wasn't security wiped, then dumping the images and phone numbers found, on the Internet? Don't really want a debate about the morality, just if anyone knew the legality of this? In the UK. Possibly looking to right up an article or blog post on this subject.
  3. joeypesci

    Spinrite

    Anyone interested, although I haven't tested yet, I got a reply from their support
  4. joeypesci

    Spinrite

    Anyone use SpinRite? I use it now and then but I've hardly ever been able to get it to work totally properly. What I mean is, it starts doing it's scan and I walk away and leave it. But then it gets to it's own screen saver type screen when you can press spacebar to select another screen view, but it does nothing. Still carries on it's scan but I can never get it back to see the results. Done this on several different machines and several different HDDs I've used it on over the years. Seems a bit shit. Any ideas?
  5. Haven't tried wireshark as thought wireshark would be more to monitor specific traffic over the network to see what data is going across if someone else is using it. But this is just me. I have my PC, a spare PC and another HP PC that runs ESXi with VMs in it. The VMs are a DC and Replication DC, a File Server for profiles (hardly used), 2 netgear 1Gig 8 port switches, Readynas Duo in no RAID they are just seen as JBODs the drives in them and also a Synology Diskstation with 4 drives in also in JBOD setup. I'll give the suggestions a try. Thanks.
  6. Youtube your model because those HPs were notorious for having the graphics card overheat and then just giving you a black screen. A few vids floating around YouTube on it.
  7. Anyone know of some decent and free or not free network monitor software? To look at speeds etc? I'm trying to find out what is causing the slow copy speeds on my home network. Everything is gigabit. The cables, the nics, the nics in the NAS drives. Currently moving about 75GB to the Netgear Readynas Duo from Windows 7. The speed started off at about 20MB/second and has gradually dropped to 10.7mb as I type. Need to find out what is causing the slow downs. Is it due to work I'm doing on the PC I'm moving files from? Is it because I'm stream a video from the Internet? Moving/copying speeds has never been that great on my home network it seems.
  8. joeypesci

    Ip4 Vs Ip6

    A lot of companies will be sticking with IPv4 internally as there is no need for 6. Just on the Internet but for a guide I like ITIdiots vids http://83.170.75.178/shows/podcasts/ITidiotsL72.mp4 http://www.itidiots.com/itidiots/ Episode 72: IPv6 Essentials 12/21/2009 Well IPv4 isn't gonna last forever, and yes I know people have been saying that for ages but we are getting closer to the end. In this episode we take a look at IPv6 and describe some of the key differences. Get ready now and stay ahead of the crowd.
  9. So it's actually got a release date now. Trailer looks good but still never been interested in the game :)
  10. It's what the client wants. No idea why, but they don't want to reset it. Might be the login details for the ISP maybe? I use to be with BT and luckily wrote mine down years ago, then reset the router and had to hunt round for the ISP login details :) I know they could call the ISP I guess. I don't know. Anyway, thanks for the suggests.
  11. Is it possible to do a dictionary attack a router to get the admin password? Haven't got the details of the router yet but a client has had a stroke so can't remember the login details. They don't want to reset the router and just wondered if there was a way of brute forcing the password? Before anyone comments. All above board and genuine.
  12. It appears that the search provide box in IE, bypasses the host file, so if they use that, it won't work.
  13. Ah yes :) works now thanks :) I didn't know you could do <ip address here> google.com google.co.uk all on the same line. Never really touched the host file before.
  14. joeypesci

    Google.com

    In the UK and I can get the IPs of google.co.uk via nslookup, but can't get hold of the .com ones. Messing about testing a host file for redirecting from google to yahoo. If user types google.co.uk the host file appears to work and they get redirected to Yahoo. They type google.com and it goes to google.co.uk (as google detects the country you're in). Make sense? So would like the .com IPs so if they type that it also goes to yahoo.co.uk
  15. They used Trend then Sophos at the NHS. Both seemed a bit shit, but they picked them cause they were cheap. I say seemed a bit shit as it might of just been the way they had set them up. As there was no one specific person who admined the AV. NHS has a habit of just ticking boxes and picking the cheapest solution.
  16. At old place of work that was a government run organisation we used tape backups for daily, weekly and monthly backup. Tapes were kept off site or one site but in a different fire zone in a fire proof safe. I was the chump that had to put the tapes in every day and then back to the safe. In all that time I dropped those tapes at least a dozen times (attempting to carry around 12 tapes without anything to carry them in). They survived, I don't think HDDs would of :)
  17. Is it possible to monitor any LogMeIn connection on a corporate network? We suspect someone is using it, we don't want to block the site yet but monitor to see if it is being used on the work station we think.
  18. Thanks for the replies. That's all I needed to know.
  19. I understood a bit of that :) If the hacker got onto the laptop, in non technical terms, what would they have access to?
  20. So how secure really is the XP firewall? As far as I'm aware it's shit. Any decent hacker (of which I'm not) would be able to get round it. So when I'm told in a corporate environment "The Windows firewall needs to be on when a user is off the corporate network and connecting in from home via VPN. Because if someone does a man in the middle attack and the firewall isn't on, they can compromise the system (laptop) and then have full access to the VPN network.". I understand that without the firewall the laptop is open and you could jump onto it and then have access to the VPN connection. However, even with the XP Firewall on, I felt this would just prevent casual hacker, someone who knows small amounts and would not know how to get around the firewall. But anyone with some knowledge would easily be able to circumvent the XP firewall. The way this VPN seems to work is the user will go to a secure web address that is works. Then connect using their VASCO token and may have access to some virtual desktops via some icons in the browser (IE). If they don't have that access the only access they have is access to OWA e-mail. So, if there was no firewall what would someone in a man in the middle attack have access to? As far as I'm aware, even if the firewall was on and they were doing a man in the middle attack. Surely they could use SSL strip to get to the OWA data? I'm not expect. What does everyone else think?
  21. Not always. There are some grey areas in some aspects that need asking. I'm in England, use to own a blank firing Beretta. Before I brought it I had to ask if it was legal to own. Was a grey area. But was fine as long as it couldn't be converted. Now, however, the law has changed but I managed to sell it before that happened. Last time I checked you had to be a member of a re-enactment group now to be allowed to own one. Annoying cause I wanted a Glock.
  22. Cool. Nice work. I even did a dns flush as thought it was me :)
  23. Yeah I know you meant domain profiles. But what happens is, you log a user in and the profile gets copied to the PC, so I then just call that their local copy. When they log out it should get copied back to the server, however, the local copy stays. So then when they log in again, they don't have to keep downloading their profile every time. It will just login, check for changes, if there are none, then just use the local copy. Sometimes the syncing fails and it keeps just using the local copy and not the domain one. So you can just reboot, login as yourself, rename their local copy of the profiles, log them in again and it will download the copy off the server again. It's still good practice I feel to rename the old profile, as there are some things that don't sync back to the server. Like the Outlook auto complete file when they type in the address field. I don't believe that gets copied over. And believe it or not, the old place I worked out, a manager who was a bit dense when it came to IT raised a call to have this restored, because she'd "Lost all her contacts". When I went to see her to find out what she meant. It turns out she'd been using the auto complete as her contacts. So she assumed if they appeared in auto complete they were perm. Had to them explain to her, and she still argued the point, that the auto complete is just a nice feature MS included in Outlook. That it was only a temp file and WASN'T to be used to save contacts. That it can, at random, reset itself to be blank. Told her it wasn't a fault, it was by design. To save more arguing I showed the silly bint where the file for this was, and told her, if she insists on using it for what it's not designed for, then she needs to back this file up herself manually. And yeah, about the local files. We had that same policy, but you have to remember how flaky roaming profiles are. They were never perfect where I worked, so sometimes hadn't synced back to the server for months. The user hadn't noticed and despite telling them NOT to save to the desktop they'd still sometimes do it. Then when the files lost you'd never hear the end of it, despite them having been warned. I was in the NHS and we had one Director who I'd warned time and time again NOT to save all her files on her desktop. She had a roaming profile but had almost all her files dumped on the desktop. I told her, if they are syncing fine, they will be being backed up. But if her profile gets corrupt on the server, then she loses her files. I had enough and put a short cut on her desktop to a folder on her own network share. Told her, when she has the told to drag all her desktop icons to that folder. She said "How do I do that?" She was notorious for kicking off if anything didn't go her way. I'd tamed her. But when I wasn't there once and at another site, she'd lost one of these documents off her desktop. Went mental. It hadn't been backed up either as don't think her profile had synced. She was moaning at the IT Team and they were rushing around to sort her out. I turned up, saw her in the dinning area. Despite her moaning at everyone else I couldn't help but say to her "I did warn you several times" She attempted then "Yeah, I know you did". File was recovered in the end. Few weeks later I went to fix another issue for her. She still hadn't moved the fing documents off her desktop. One of the NHS Trusts had put in a policy that no user was allowed to save to the desktop and put a GP in place to stop it. But then main trust I worked for, didn't. It was their board of directors that decided most IT policy, not the IT department.
×
×
  • Create New...