Solved

wipe clues from server

Posted on 2002-05-22
9
156 Views
Last Modified: 2010-04-13
Hi experts, I need your help!!

I have recently switched on my win98 workstation, logged into the w2k server domain and then accessed and copied password protected data that I wasn't supossed to access.

Could w2k server had loged this operations (without 3rd party software)? If the answer is yes, where does it places the log files so I can clean them?




0
Comment
Question by:nasheerz
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
9 Comments
 
LVL 3

Expert Comment

by:Dmitriy
ID: 7027027
You can't.  And yes, the access is logged.  The auditing trail will show who logged on and did what with files.

P.S.  This sounds like hacking.  This site strictly forbids any topics with relevance to illegal activities.
0
 
LVL 9

Accepted Solution

by:
TooKoolKris earned 75 total points
ID: 7027060
I suggest you own up to your mistakes before they find you. If it's a critical thing it's going to be much better if you go to them instead of them coming to you. W2K definitely can't track all file access within it's logs and unless you're a Server Operator or a Domain Admin you aren't going to be able to clear the logs even if you do find out where they are. Smile your busted!

TooKoolKris
MCSE+I, CCNA, A+


0
 
LVL 9

Expert Comment

by:TooKoolKris
ID: 7027065
I meant to say that W2K definitely CAN track, sorry for the typo.

TooKoolKris
MCSE+I, CCNA, A+
0
Free Webinar: AWS Backup & DR

Join our upcoming webinar with experts from AWS, CloudBerry Lab, and the Town of Edgartown IT to discuss best practices for simplifying online backup management and cutting costs.

 

Author Comment

by:nasheerz
ID: 7027615
I have administrator access to the server, so this has nothing of ilegal. Where are that logs located???
0
 
LVL 9

Expert Comment

by:TooKoolKris
ID: 7027902
Ask your network administrator then.
0
 

Author Comment

by:nasheerz
ID: 7028047
Sorry ToolKoolKris but this site is for questions and answers, if you don't know the answer or if you don't want to help me with this trouble, just don't put more impertinent comments to me.

Thanks.



 
0
 
LVL 9

Expert Comment

by:TooKoolKris
ID: 7028164
This site is for questions and answers that's correct. However it's not for helping you cover your tracks when you accessed files you shouldn't have. Nobody on this site is going to help you in your quest to erase logs so that no one will know that you accessed files you shouldn't have. This question will also be notified to the site operators to see that it is properly deleted as well. Have a good day.

TooKoolKris
MCSE+I, CCNA, A+
0
 
LVL 7

Expert Comment

by:jmiller47
ID: 7028310
You stated that you accessed files you weren't supposed to. Therefore, you were doing something against company policy. It is against the morals of this board to answer any questions regarding covering up tracks, doing something you are not supposed to, or hacking. I don't think you'll get any answers here...
0
 
LVL 5

Expert Comment

by:Netminder
ID: 7028360
nasheerz,

The answers you've been given are the ones you're going to get; I've force-accepted accordingly.

I've been in Net Admin for a company which does a lot of work with banks and governments. One of my colleagues did exactly what you've done, and had he not gone to our boss and told him (he looked at the CEO's email) he'd have lost his job, even though he has full admin privileges.

The logs exist specifically to see who's doing what. You've done it. I think your course of action is clear. Further, I've alerted EE Admin to this question, and made a notation in your EE profile.

Dmitriy: points for you at http://www.experts-exchange.com/jsp/qShow.jsp?ta=win2k&qid=20303703
jmiller47: points for you at http://www.experts-exchange.com/jsp/qShow.jsp?ta=win2k&qid=20297679

Netminder
CS Moderator
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
This article summaries thoughts and ideas from two years of sustained use. It provides good reasoning to make the jump to Windows 10.
In a recent question (https://www.experts-exchange.com/questions/29004105/Run-AutoHotkey-script-directly-from-Notepad.html) here at Experts Exchange, a member asked how to run an AutoHotkey script (.AHK) directly from Notepad++ (aka NPP). This video…

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question