Why?
No offense to anyone in this forum, but I know how to either A) keep problems from happening on my machine or B) fix it when a problem occurs. I never reformat and reinstall. I dont have to maintain backups except for the case of disaster recovery. I still have every single file that Ive...
Have had tons of beta software, test software, installs, uninstalls, errors, parrallel installs, fixes rollbacks and have not formatted my machine in over 5 years. Same XP Pro installation since Feb 2001. And, yes it still works perfectly. FUD
I read an article recently that it was up to 10 complete overwrites now. Forgive me for no link it was in a hardcopy trade mag. Just thought Id toss my few pennies in :)
Not only can a MAC table be flooded its actually easy to do if you know where to look to get the correct app. Luckily most modern switches are immune to these skiddie attacks.
Where the heck where you people a couple weeks ago when I was trying to convince him of this stuff?
Anyways, plenty of links to the old thread. I hope that O[H]-Zone can finally now realize what we have been trying to tell him.
Agreed, it is very rare that someone needs to run as admin. Usually it is just a case of being lazy. I guess the argument hinges on wether or not he needs to be logged in as admin, and since his argument falls apart if he doesnt need to then I suspect we will never get a truthful answer to that...
*shrug*
One of those situations where it is pointless to argue with people who are convinced they are correct. When he gets out of school and possibly gets control of a production network he may finally realize the danger of excessive administrative overhead and the danger of running as...
He linked you to a US govt website dealing with security practices, which you claim is the reason for disabling the service, that mentions nothing about disabling the service. Drivel? Hardly.
I would be more than happy to take these questions one at a time
The same reason you probably have several services running that you do not use. Because there is no realistic benefit from turning it off and by turning it off on any large scale you are creating what is known as administrative...
I sometimes wear foil on my head outside because ya know, even though there isnt evidence of alien mind control rays and even though Im not sure foil would help me even if there was, I can never be too careful...
The big thing youre missing is if they logged on with a limited account then they could have just run the password cracker at the initial logon. Besides none of that would be an issue if you had a decent account lockout policy defined :rolleyes:
Incorrect. If I can get in your machine the secondary logon service will not allow me to get in farther.
You do not understand the service. The secondary logon service does not allow someone to "get admin access". It is a logon service. Like the netlogon service is.
Please stop and take...
You proved my point. Running as admin, although lots of people do it, is a security risk. Just like running as root in any *nix distro. The secondary logon service solves this risk just like su does in *nix. If someone were able to use the secondary logon service to logon to your machine then...
Since we are throwing out credentials, Hi I am an MCT and have been teaching for Microsoft on how to use their products for over 5 years. The secondary logon service does not do what you think it does and disabling it does not make your computer any more secure and people who do so are actually...
If the owners would have just turned off their secondary logon service then a second person wouldnt have been able to log on to the machine. Its actually all microsofts fault for providing the secondary logon service, allowing a second person to logon to the machine.
Here is something you might think about:
Some anti-spam software will do a reverse lookup on incomming message domain names to determine if the registered IP address actually belongs to the listed domain name or is it being spoofed. Now, you may be whitelisted, but at the same time, if you do...
Not to derail but oak is displaying his certs pretty close to accurate. Even though the MCSA program involves several exams that may be used for the MSCE it is still different enough to technically be a different cert. As for the MCP, this should only be used if you have passed an exam outside...
Group policy application happens in the following order: Local computer policy, site, domain, parent ou, child ou. If there are no conflicts in any of the policies then all policy settings are cumulative. If there are conflicts then the policy that was applied at the lower level will be the...
I have to concur with the general consensus here. SBS is a wonderful product designed for small business of about 50-75 clients. Its cheap, robust, easy to manage and highly integrated. Thats the point though, its designed as a server level product for businesses.
BTW, am I the only one who...
Simple answer: although the kernels are very similar the application environments are quite different. Things like lazy coding or obfuscated routines can lead to software that will only run on one operating system, period. Hell, I used to run an app that would run on NT 4.0 service pack 4. Not...
Great thread!
Just a thought in relation to the win98 for performance issue. As a subnote I've seen it suggested before that fat32 be used for performance vs. NTFS due to the overhead associated with the additional features of NTFS. While this may be true on small volume sizes, its not true...
sorry to derail a bit but i tell ya what is scarier is the number of people with x10 unencrypted cameras out there nowadays. If you got one just make sure you dont point it at anything private!!
technically of course as long as one wire meets another on the other end it doesnt matter how the pairs are matched up. If you follow TIA 568A or 568B its supposed to be a certain way
Truthfully it's not that bad. The policies were put into place about 4 years ago and only modified everyone once and a while for new known threats. Patching is done automatically through a SUS. Could the thing be cracked? Sure, anything can given the right skills and enough time, in fact its...
The built in auditing feature should do exactly what you want. You need to edit the security policy of the machine either locally or through a gpo to audit object access for that machine. Then you need to specify each file that needs to be audited and for which groups/users by editing the...
Technically speaking, Novell has been doing the right thing for many years now. They just need to put it in people's face. They need to show the world WHY their software should be purchased over an MS product and not just assume that we know.
Actually all directory services wether it be AD or NDS are at least based upon either the x.500 or LDAP, which is a subset of x.500, standard. No one company necessarily "invented" directory services so to speak. The edge that Netware has is their directory is fully LDAP (or maybe its x.500 I...
There's plenty of reasons and they are all good. It's unfortunate that Novell doesn't want to spend the money or time marketing these reasons like MS does. Oh well, their loss.
I still use a Netware 3.12 and 2 Netware 4.11 servers. They still work great too. Unfortunately they won't give MS a run for their money until they fire their marketing department.