Visit the Ironworks Gaming Website Email the Webmaster Graphics Library Rules and Regulations Help Support Ironworks Forum with a Donation to Keep us Online - We rely totally on Donations from members Donation goal Meter

Ironworks Gaming Radio

Ironworks Gaming Forum

Go Back   Ironworks Gaming Forum > Ironworks Gaming Forums > General Discussion > General Conversation Archives (11/2000 - 01/2005)

 
 
Thread Tools Search this Thread
Old 02-02-2004, 03:48 PM   #11
J.J.
Symbol of Cyric
 

Join Date: March 1, 2001
Location: Montana, USA
Age: 60
Posts: 1,217
[quote]Originally posted by Felix The Assassin:
Ouch on both mishaps. God speed to you and your recovery.

You mention chief and state. I'm wandering into you either are a state employee or have access to the state provided LAN. I don't want to get on a tangent here, but what did the fine print state about your privacy on a government unit? Or, is the unit yours, and you briefcase it to and fro the business office and home? [QUOTE]

The laptop is company property, yes, we have a state-lan, not govt. He is the one who 'configured' the laptop b4 I got it, so he did not need my cooperation to set up remote access.

[QUOTE] What makes me tink on this is why you. A spam sender, a cc grabber, a porno server, just think of what you hate most about the net, and thats what could be happening. I don't think he has set you up, but he might be, setting up for the rope-in. [QUOTE]

what is going on, since he has got to be SOOOO frustrated by the fact that there is nothing but work on my work comp, that the remote access is to be used to use MY logon to go porno pond splashing, then he will "discover" the baaaad activities of mine using company property. He is the one who setup the laptop b4 I got it, and yes, he left a ton of company info on the laptop as well, sales and $ info that I cannot access ordinarily, so that may be what else he plans to "discover" as well.

[QUOTE] And in doing so, is allowing you to be found innocent by limiting your options, so when BB comes knocking, he can prove your unknowing, and inability to conduct these dark trades. By allowing the remote to be left open, he can then establish all the data required to finalize the lasso.
My advice is do not put any type of internet block, app on, or use any other type of net monitoring apps. I would also be seeking conversation with the boss on why the IT has put a strangle hold on your system. Especially if you have a suspense on a project that you are not going to make due to not being able to compute.[QUOTE]

The head knows about the problems, and the remote app. the only proof I have so far is that the IT told the chief that he COULD NOT remote access the laptop w/o my active cooperation. That is a provable lie, according to the tight vnc website itself. but, I would like to get more on him, so that instead of just singeing his career, It can be burned down into dust and ashes.

Quote:
Good Luck
[ 02-02-2004, 03:51 PM: Message edited by: J.J. ]
__________________

Amanda, Kyleia, and Kathleen\'s Dad-Best Damn Job, Period.

Official procrastinator of the O.L.D. C.O.O.T.S. Clan
unOfficial Homeopathic Quacktitioner of the IW Realm
J.J. is offline  
Old 02-03-2004, 07:49 PM   #12
Jedimaster
Dungeon Master
 

Join Date: February 27, 2002
Location: Huntsville,Al,USA
Age: 67
Posts: 96
If you have access to a STATE owned LAN ask the States IT SysAdmin to help you.
__________________
I am a Trekker I like Simcity 2000, Star Trek,<br /> Star Wars, Science Fiction books, movies and TV shows.<br />My web address is [url]\"http://home.comcast.net/~m.nelson10\" target=\"_blank\">http://home.comcast.net/~m.nelson10</a> <br />My email address is m.nelson10 at comcast.net
Jedimaster is offline  
Old 02-03-2004, 08:12 PM   #13
Felix The Assassin
The Dreadnoks
 

Join Date: September 27, 2001
Location: Orlando, FL
Age: 61
Posts: 3,608
Me tinks we are talking two different directions here. So I will take liberty of a more recent attack notification so we may understand each other better.

<<>>
W32.Novarg.A@mm is a mass-mailing worm that arrives as an attachment with the file extension .bat, .cmd, .exe, .pif, .scr, or .zip.

When a computer is infected, the worm sets up a backdoor into the system by opening TCP ports 3127 through 3198, which can potentially allow an attacker to connect to the computer and use it as a proxy to gain access to its network resources.

In addition, the backdoor can download and execute arbitrary files.

There is a 25% chance that a computer infected by the worm will perform a Denial of Service (DoS) on February 1, 2004 starting at 16:09:18 UTC, which is also the same as 08:09:18 PST, based on the machine's local system date/time. If the worm does start the DoS attack, it will not mass mail itself. It also has a trigger date to stop spreading/DoS-attacking on February 12, 2004. While the worm will stop on February 12, 2004, the backdoor component will continue to function after this date.
<<>>

Now let me re-cap. If the IT is on to something, you are clueless. He should be trying to protect you and the company from any legal wrongdoing, and protecting assests.

Now you state he did this prior to you receiveing the unit, who was the previous user? How volatile is the market you are in? What type of secrets could be lost? Better yet, what kind of deceitful, technically incorrect, secrets could bring devestation to a competitor?

To you this is a why me, end of the world event. To me, this is a challenge of the career as an IT.
__________________
The Lizzie Palmer Tribute



Let every nation know, whether it wishes us well or ill, that we shall pay any price, bear any burden, meet any hardship, support any friend, oppose any foe to assure the survival and the success of liberty.

John F. Kennedy
35th President of The United States

The Last Shot

Honor The Fallen

Jesus died for our sins, and American Soldiers died for our freedom.




If you don't stand behind our Soldiers, please feel free to stand in front of them.
Felix The Assassin is offline  
Old 02-03-2004, 08:13 PM   #14
J.J.
Symbol of Cyric
 

Join Date: March 1, 2001
Location: Montana, USA
Age: 60
Posts: 1,217
Have figured a way to make the laptop useable, right now, and save all the IT guy's dirty deeds at the same time. Am going to tell them to buy a new hardrive for the thing, and just completely take out the old one.
that way , I can do my work w/o worrying about him getting in there and mucking about after the local comp fixer does his thing.
AND, it lets me send the hard drive off to a company who specializes in peeling the layers of the onion, and that report will suffice as far as any other evidence about his nefarious activities.
I'll put my own copy of win2kpro on the thing, be the administrator, and he can knowck on the door all he wants. as far as the offer of a firewall, and a way to catch him at his game, PLEASE DO TELL!! I know he will try, and that would be some delicious icing on the cake. So, please e-me or send a pm about what sort of trap I might be able to set for this loose canon, I want th3e others to know b4 I go what he did.
thanks for all the suggestions, btw. [img]smile.gif[/img] - me smiling for the first time in a while.
__________________

Amanda, Kyleia, and Kathleen\'s Dad-Best Damn Job, Period.

Official procrastinator of the O.L.D. C.O.O.T.S. Clan
unOfficial Homeopathic Quacktitioner of the IW Realm
J.J. is offline  
Old 02-04-2004, 07:39 PM   #15
Elif Godson
Dracolich
 

Join Date: August 28, 2001
Location: Hurricane Valley
Age: 51
Posts: 3,089
JJ, I am sorry to hear about the skiing accident, OUCH bud I hope for your speedy recovery and luck on the work front.

VNC is a widely used program for adminstration/IT people to help the end user "fix" there problem. You can go into the admin tools on the control paneland disable it so the only way he can use it is if you physically activate the program. I had an IT guy who thought he was going to one up me at work, and I proved him wrong [img]smile.gif[/img] VNC can and is used for "spying" on what an end user is doing and the user may not even be aware. There are several different options for the admin to use on it, and one is a simple observation mode that will show nothing to the end user, if they are activily using your PC the VNC icon in the task bar will change colors.

Good luck bud and I hope you nail his arse. You canalos check the event monitor in the control panel as well to see if there has been anyone other then you accessing your comp.
__________________
Children get Arthritis too!
http://awtampa.kintera.org/jaaware
Elif Godson is offline  
Old 02-05-2004, 12:46 AM   #16
Harkoliar
Jack Burton
 

Join Date: March 21, 2001
Location: Philippines, but now Harbor City Sydney
Age: 40
Posts: 5,556
gee how IT people can be so evil now
__________________

Catch me if you can..
Harkoliar is offline  
 


Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 
Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is On

Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Paris Hilton screwing.... Hivetyrant General Discussion 24 10-18-2005 06:16 PM
Nalia romance is screwing up Kelsey. Indemaijinj Baldurs Gate II: Shadows of Amn & Throne of Bhaal 3 06-18-2003 06:43 PM
Windows XP Remote Assistance Ronn_Bman General Conversation Archives (11/2000 - 01/2005) 10 10-07-2002 09:09 AM
Remote controls? Megabot General Conversation Archives (11/2000 - 01/2005) 7 05-16-2002 02:36 PM
just screwing around slackerboy General Conversation Archives (11/2000 - 01/2005) 11 04-04-2001 10:12 PM


All times are GMT -4. The time now is 04:04 PM.


Powered by vBulletin® Version 3.8.3
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
©2024 Ironworks Gaming & ©2024 The Great Escape Studios TM - All Rights Reserved