-
February 10th, 2004, 09:41 PM
#1
Getting past admin rights?
Hi all I was just wandering if it is possible to get around access denied areas on our work computers. For instance when I tried to delete a file , also change the backround just stuff like that, it say's that I do not have admin rights .Any suggestions?
besides getting admin rights....
-
February 10th, 2004, 09:45 PM
#2
And besides not doing it because the Security Policy or AUP says you shouldn't? Talk with your Admin about "loosing" some of them.
What OS is the computer? (there's one work around on the desktop picture if the perms aren't too stringent and provided you don't put any "body part pictures" up)
-
February 10th, 2004, 09:47 PM
#3
If it's a workstation you use everyday, just asking for permission to customize it, is not a bad start.
Outside of getting proper autorization, don't do it. Is it really worth getting fired for changing your background anyways? Plus, the administrators put those controls in place, so people don't change the configuration of the computers, the goal of the work computer is to satisfy their business objectives, do you really want to go off and mess with something like that?
--PuRe
-
February 11th, 2004, 12:58 AM
#4
Windows 2000pro , and they are the library computers..so anybody and everybody access's them.I was curious ,I would definitly loose my job if I was caught ,But only curious becuase our college computers were kind of like that but they wouldnt even let you install games like unreal demo or anything for that matter so just wandering if there was a way around it!
This is how I learn some things. So thanks again
-
February 11th, 2004, 01:46 AM
#5
you have answered your own question. There are always ways round things, but as PuReExcTacy says, they are there for 'work', and a standard set up helps for whenever a 'ghost image' is required to put back any lost / damaged data. As for installing demo's ???? I'm certain what the response to that request would be !!
And for MsM: "body part pictures" ???
so now I'm in my SIXTIES FFS
WTAF, how did that happen, so no more alterations to the sig, it will remain as is now
Beware of Geeks bearing GIF's
come and waste the day :P at The Taz Zone
-
February 11th, 2004, 02:25 AM
#6
.. and they are the library computers
.
Definately do not want to mess with public access computers.
foxyloxley: "body part pictures" is my euphemism for porn or near porn pictures (often falls under sexual harassment/human rights kind of clauses).
-
February 11th, 2004, 04:54 AM
#7
agreed, other people use the computer for lagitamite use, and if you change the poloicy without permition, and if your cought they could slap a some kind of charge on you.. i know i have done it befor myself......
But for educational use; try searching for Win2000Pro policy editors/cracks... but remember you can get into trouble
-
February 11th, 2004, 06:03 AM
#8
pZargs,
I gather that you work at the library?.................if you could do things like you are suggesting, so could anyone who walked in there...............not a good idea?
Foxy.............we have laws (in the UK) about sexual harassment, and those "ladies with large personalities" backgrounds fall into that category. However, MsMittens is not a good liar............the deal is that as long as she does not use a picture of my "brane" as a background, I will not report her to her University Authorities for misuse of the electron scanning microscope hence the "body parts" euphemism.
MsM has hit the nail on the head with "public access computers"............would you want your daughter to go into a library and after five minutes get something that some sickko had loaded onto it? That goes back to my first comment.
Cheers
-
February 12th, 2004, 09:17 PM
#9
Ok I actually work at a hospital that has a library, and i just used those Q's for instance.I didnt really want to change the backround. I was more curious about the methodology of network security. I guess im trying to learn things the wrong way . I'll have to try another approach...thanks all
-
February 12th, 2004, 09:22 PM
#10
Ah.. perhaps you should invest in a book like "Hacking Exposed". While it's not the best book, it does have something that I find is pretty good. Look at the back of the book on the inside cover. You'll see a simplified description of the methodology of attack. It's general but should give you an idea of what an attacker is going to do (this is what I think you're getting at).
Network Security goes beyond just desktop settings but also deals with procedures and policies. Within a hospital settings there are a fair amount (or if not, should be!). Security policies telling people what they can and can't do, standards as to what must be done and procedures on how it's to be done is all part of Network security (beyond the "twisting of knobs and radio buttons" as a colleague of mine points out). What you are describing, I think, is penetration testing or auditing: basically, what are the potential vulnerabilities, risks and threats that could take advantage of those things and how to prevent it.
Sound around right?
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|