Jump to content

Dec100

Active Members
  • Posts

    62
  • Joined

  • Last visited

  • Days Won

    3

Posts posted by Dec100

  1. My main objective was to deploy this in a law firm where the secretaries move around all the time. We watned it so that if a computer went down, they would still haave all their data; we would be able to just throw a new comuter in that spot and vola they are back to work while we work on the faulty computer.

    You could even do login scripts on the user AD accounts for that.

  2. I'm not sure you need to use roaming profiles for what you want to do. Roaming profiles allow users to login to different machines and still see their settings, Internet favourites, etc. As mentioned, these are usually a massive pain in practice.

    Sounds like you are just asking about mapping certain network drives for users based on something like AD group membership? That is pretty easy with GPO - http://blogs.technet.com/b/askds/archive/2009/01/07/using-group-policy-preferences-to-map-drives-based-on-group-membership.aspx

  3. So are you asking which is the best way to hide your identity out of the options in your list? Depends on what you are trying to do.

    Who are you trying to hide from? Are they on the same network as you or over the public Internet?

    If you are just trying to hide all your activity over the Internet, you've already been given the answer.

  4. Problem I'm having is although IT is my life, I enjoy my work and it's also my hobby and I've never got bored of it, so where's the problem? Gaming. I'm also a bit of a gamer and my motivation or discipline is shit. I have Vivek's WIFI book that he released in the hopes to learn at least the basics of one area, but I've never forced myself to sit and go through it all. I always end up on a game instead of studying more. I have another powerful PC which is my lab machine with ESXi etc on it. I set it up then end up on a game again so neglect it for months. Need to sort that out if I want to learn more and progress.

    Yeah, it's always hard to make time to learn something new. My advice is to allocate a solid hour to work on it a couple of times each week, and promise yourself you will play games after if you complete the hour. Once you get started, you tend to get more into it and it becomes less of a chore. That's what works for me, anyway.

  5. That's where it's annoying as I'd considering it "Tough tits. You found the stick in the office car park. Instead of handing it in at reception you decided to take it home, maybe hoping for a free memory stick. But no, you've been infected instead, but again, tough tits for not being honest"

    :)

    Digip is exactly right though, it is too much of a grey area. Sure, the finder may simply be stealing a memory stick, but who's to say they didn't just plug it in to identify the real owner in order to return it? Or maybe they had one that looked exactly the same as your one and thought they dropped it. There's a fine line. Safer and more ethical to not have any payload that could get you or your employer into trouble.

  6. What are you trying to achieve?

    Presumably, you either want to convince management to block USB drives, or you're running some kind of user awareness scheme.

    I would look to secure a trial of some USB control software (most enterprise AV vendors have a module), scatter some completely benign devices with recognisable device IDs, and then use the software's monitoring/logs to show management or users your results on how many were plugged into company systems. That way you limit ethical concerns and still prove your point.

    Using software like this would also have the benefit of logging the use of non-authorised USB devices that you didn't plant. Finally, it would potentially show how many USB devices are legitimately used for business, helping you to budget for encrypted or authorised devices to replace them.

  7. Don't take too seriously any attitude you see in these talks. They are preaching to the security converted and trying to show off a little. If anyone really treated clients that way (or cared that much, for that matter), then they would be in the wrong profession.

    In reality, pentesters are hired to report on the security status, recommend better practice where relevant, and then back off. As mentioned above, it all comes down to money. The client company gets to decide whether fixing or leaving problems is most cost effective. It's simple business. Sure you get clients making questionable decisions, but that is their business.

    Certainly, don't let anyone's attitude dissuade you from getting more involved in security. You get all types in all professions, but I suspect anyone causing trouble for someone earnestly joining the industry would be quickly shot down by the majority.

  8. My rules for this are:

    1) I'll help when I have time. No chasing or moaning.

    2) I'll help as best I can, but if something screws up, I'm not responsible.

    3) Friends and family only. I'm not helping friends of friends unless in extreme circumstances.

    4) If you don't agree with my advice or explanation, feel free to sort it out yourself however you see fit.

    Seems to work well enough.

×
×
  • Create New...