Page 1 of 2 12 LastLast
Results 1 to 10 of 15

Thread: Getting past admin rights?

  1. #1

    Getting past admin rights?

    Hi all I was just wandering if it is possible to get around access denied areas on our work computers. For instance when I tried to delete a file , also change the backround just stuff like that, it say's that I do not have admin rights .Any suggestions?
    besides getting admin rights....

  2. #2
    Just a Virtualized Geek MrLinus's Avatar
    Join Date
    Sep 2001
    Location
    Redondo Beach, CA
    Posts
    7,323
    And besides not doing it because the Security Policy or AUP says you shouldn't? Talk with your Admin about "loosing" some of them.

    What OS is the computer? (there's one work around on the desktop picture if the perms aren't too stringent and provided you don't put any "body part pictures" up)
    Goodbye, Mittens (1992-2008). My pillow will be cold without your purring beside my head
    Extra! Extra! Get your FREE copy of Insight Newsletter||MsMittens' HomePage

  3. #3
    Senior Member
    Join Date
    Mar 2003
    Posts
    452
    If it's a workstation you use everyday, just asking for permission to customize it, is not a bad start.

    Outside of getting proper autorization, don't do it. Is it really worth getting fired for changing your background anyways? Plus, the administrators put those controls in place, so people don't change the configuration of the computers, the goal of the work computer is to satisfy their business objectives, do you really want to go off and mess with something like that?


    --PuRe
    Like this post? Visit PuRe\'s Information Technology Community. We\'ve also got some kick ass Technology Forums. Shop for books and dvds on LiveWebShop.com

  4. #4
    Windows 2000pro , and they are the library computers..so anybody and everybody access's them.I was curious ,I would definitly loose my job if I was caught ,But only curious becuase our college computers were kind of like that but they wouldnt even let you install games like unreal demo or anything for that matter so just wandering if there was a way around it!
    This is how I learn some things. So thanks again

  5. #5
    They call me the Hunted foxyloxley's Avatar
    Join Date
    Nov 2003
    Location
    3rd Rock from Sun
    Posts
    2,534
    you have answered your own question. There are always ways round things, but as PuReExcTacy says, they are there for 'work', and a standard set up helps for whenever a 'ghost image' is required to put back any lost / damaged data. As for installing demo's ???? I'm certain what the response to that request would be !!

    And for MsM: "body part pictures" ???
    so now I'm in my SIXTIES FFS
    WTAF, how did that happen, so no more alterations to the sig, it will remain as is now

    Beware of Geeks bearing GIF's
    come and waste the day :P at The Taz Zone

  6. #6
    Just a Virtualized Geek MrLinus's Avatar
    Join Date
    Sep 2001
    Location
    Redondo Beach, CA
    Posts
    7,323
    .. and they are the library computers
    .

    Definately do not want to mess with public access computers.

    foxyloxley: "body part pictures" is my euphemism for porn or near porn pictures (often falls under sexual harassment/human rights kind of clauses).
    Goodbye, Mittens (1992-2008). My pillow will be cold without your purring beside my head
    Extra! Extra! Get your FREE copy of Insight Newsletter||MsMittens' HomePage

  7. #7
    agreed, other people use the computer for lagitamite use, and if you change the poloicy without permition, and if your cought they could slap a some kind of charge on you.. i know i have done it befor myself......

    But for educational use; try searching for Win2000Pro policy editors/cracks... but remember you can get into trouble

  8. #8
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,188
    pZargs,

    I gather that you work at the library?.................if you could do things like you are suggesting, so could anyone who walked in there...............not a good idea?

    Foxy.............we have laws (in the UK) about sexual harassment, and those "ladies with large personalities" backgrounds fall into that category. However, MsMittens is not a good liar............the deal is that as long as she does not use a picture of my "brane" as a background, I will not report her to her University Authorities for misuse of the electron scanning microscope hence the "body parts" euphemism.

    MsM has hit the nail on the head with "public access computers"............would you want your daughter to go into a library and after five minutes get something that some sickko had loaded onto it? That goes back to my first comment.

    Cheers

  9. #9
    Ok I actually work at a hospital that has a library, and i just used those Q's for instance.I didnt really want to change the backround. I was more curious about the methodology of network security. I guess im trying to learn things the wrong way . I'll have to try another approach...thanks all

  10. #10
    Just a Virtualized Geek MrLinus's Avatar
    Join Date
    Sep 2001
    Location
    Redondo Beach, CA
    Posts
    7,323
    Ah.. perhaps you should invest in a book like "Hacking Exposed". While it's not the best book, it does have something that I find is pretty good. Look at the back of the book on the inside cover. You'll see a simplified description of the methodology of attack. It's general but should give you an idea of what an attacker is going to do (this is what I think you're getting at).

    Network Security goes beyond just desktop settings but also deals with procedures and policies. Within a hospital settings there are a fair amount (or if not, should be!). Security policies telling people what they can and can't do, standards as to what must be done and procedures on how it's to be done is all part of Network security (beyond the "twisting of knobs and radio buttons" as a colleague of mine points out). What you are describing, I think, is penetration testing or auditing: basically, what are the potential vulnerabilities, risks and threats that could take advantage of those things and how to prevent it.

    Sound around right?
    Goodbye, Mittens (1992-2008). My pillow will be cold without your purring beside my head
    Extra! Extra! Get your FREE copy of Insight Newsletter||MsMittens' HomePage

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •