Solved

Trashed Mac  Files

Posted on 1997-05-15
1
321 Views
Last Modified: 2008-03-06
Netware 3.12 issue:

I had a breakdown in security and one of our students(?) has deleted files
from three teacher's directories.  Most of these files were Macintosh
files.  When I use salvage I can find the files in the deleted.sav
directory and can recover them.  BUT when I try to open them with a
Macintosh they are PC files with a file type of "text".  The original
files were of several types including PowerPoint, spread sheets, databases
etc.

Anyone know of a way of salvaging these files and retaining their Mac Resources?

============

Anyone know of any way I can view some "histories" to see if I can find
out who did this?

I do know that the violator logged in as supervisor (I never do this --
the supervisor password must have somehow become compromised).  I know
when it happend -- salvage reports this.  

I have my suspisions as to who was involved.  Is there anyway of finding
out what the old (I changed it of course) passwords were for Supervisor?
Who logged in when?  When security related transactions occured?  
anything else which might help me identify the *)(%$^&@#&% who did this?

=============
Any of you out there EXPERTS on Novell-Macintosh issues?  I might be
willing to even pay for some support?
=============

Thanks for any help.


David Madfes
Technology Coordinator
Abraham Lincoln High School
San Francisco, CA
0
Comment
Question by:dmadfes
1 Comment
 

Accepted Solution

by:
richweed earned 100 total points
Comment Utility
Download the following files from:

ftp://mirror.apple.com/mirrors/info-mac/_Disk_&_File/

type-edit.hqx
set-its-type-13.hqx

They should let you look up the type of some files that do work and then change the type of files that don't work to the same. You'll have to do it for each type of file eg. Excel etc

Add a comment if you still need help.

Cheers
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Describes a method of obtaining an object variable to an already running instance of Microsoft Access so that it can be controlled via automation.
Veeam Backup & Replication has added a new integration – Veeam Backup for Microsoft Office 365.  In this blog, we will discuss how you can benefit from Office 365 email backup with the Veeam’s new product and try to shed some light on the needs and …
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now