Win2k security questions.

Yalpe

Weaksauce
Joined
Oct 24, 2005
Messages
98
Here's the context.

My dad own's a small business in my town, by small I mean 15 employees. One of the secretaries has commited a lot of fraud over the past years and got away, but not anymore, she got fired a few days ago after they found out.

I'm fairly good with computers myself I think, but I don't claim to be a security specialist. Now the question is, would it be possible, for someone who worked on a specific computer running win2k, to setup an attack from the outside? The computer is on a subnet behind a router, so they have some sort of firewall, but I couldn't check if they have a software firewall installed because I'm out of town. I cannot see myself how this could be done unless she installed some sort of malicious software beforehand, and this would be very easy to spot in the process list. I doubt she could get a remote connection in any way.

What do you guys think? I'll have to check more on this when I get back to my hometown so I'd appreciate any tip/comment in case something bad happens to their business.
 
there are programs that will work behind a firewall and give you remote access.
 
In computer security, take nothing for granted. It's way too easy to hide malicious software that can easily be accessed remotely even when the computer is behind a firewall.
 
Alright, advice taken. Now how would I go about detecting these "malicious softwares"? Process list? The "Run" reg key?

EDIT : Keep in mind that we are talking about a 40+ year old woman. I really doubt she would have any knowledge of even what an IP is. But as I was told, she pulled off some very brilliant ideas to fraud so we are never too prudent I guess.
 
If you are that paranoid about it the best thing would be to just format the PC and reinstall all the software.

If you are especially paranoid about it, have your Dad unplug the PC from the network until it can be looked at by you or a professional.
 
If law enforcement has or will be involved, you'll want to check with them first before doing *anything* to that PC and that includes using it for day to day work. They (law enforcement) may want to do a forensic analysis of the computer.
 
Back
Top