Solved

wipe clues from server

Posted on 2002-05-22
9
155 Views
Last Modified: 2010-04-13
Hi experts, I need your help!!

I have recently switched on my win98 workstation, logged into the w2k server domain and then accessed and copied password protected data that I wasn't supossed to access.

Could w2k server had loged this operations (without 3rd party software)? If the answer is yes, where does it places the log files so I can clean them?




0
Comment
Question by:nasheerz
9 Comments
 
LVL 3

Expert Comment

by:Dmitriy
ID: 7027027
You can't.  And yes, the access is logged.  The auditing trail will show who logged on and did what with files.

P.S.  This sounds like hacking.  This site strictly forbids any topics with relevance to illegal activities.
0
 
LVL 9

Accepted Solution

by:
TooKoolKris earned 75 total points
ID: 7027060
I suggest you own up to your mistakes before they find you. If it's a critical thing it's going to be much better if you go to them instead of them coming to you. W2K definitely can't track all file access within it's logs and unless you're a Server Operator or a Domain Admin you aren't going to be able to clear the logs even if you do find out where they are. Smile your busted!

TooKoolKris
MCSE+I, CCNA, A+


0
 
LVL 9

Expert Comment

by:TooKoolKris
ID: 7027065
I meant to say that W2K definitely CAN track, sorry for the typo.

TooKoolKris
MCSE+I, CCNA, A+
0
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

 

Author Comment

by:nasheerz
ID: 7027615
I have administrator access to the server, so this has nothing of ilegal. Where are that logs located???
0
 
LVL 9

Expert Comment

by:TooKoolKris
ID: 7027902
Ask your network administrator then.
0
 

Author Comment

by:nasheerz
ID: 7028047
Sorry ToolKoolKris but this site is for questions and answers, if you don't know the answer or if you don't want to help me with this trouble, just don't put more impertinent comments to me.

Thanks.



 
0
 
LVL 9

Expert Comment

by:TooKoolKris
ID: 7028164
This site is for questions and answers that's correct. However it's not for helping you cover your tracks when you accessed files you shouldn't have. Nobody on this site is going to help you in your quest to erase logs so that no one will know that you accessed files you shouldn't have. This question will also be notified to the site operators to see that it is properly deleted as well. Have a good day.

TooKoolKris
MCSE+I, CCNA, A+
0
 
LVL 7

Expert Comment

by:jmiller47
ID: 7028310
You stated that you accessed files you weren't supposed to. Therefore, you were doing something against company policy. It is against the morals of this board to answer any questions regarding covering up tracks, doing something you are not supposed to, or hacking. I don't think you'll get any answers here...
0
 
LVL 5

Expert Comment

by:Netminder
ID: 7028360
nasheerz,

The answers you've been given are the ones you're going to get; I've force-accepted accordingly.

I've been in Net Admin for a company which does a lot of work with banks and governments. One of my colleagues did exactly what you've done, and had he not gone to our boss and told him (he looked at the CEO's email) he'd have lost his job, even though he has full admin privileges.

The logs exist specifically to see who's doing what. You've done it. I think your course of action is clear. Further, I've alerted EE Admin to this question, and made a notation in your EE profile.

Dmitriy: points for you at http://www.experts-exchange.com/jsp/qShow.jsp?ta=win2k&qid=20303703
jmiller47: points for you at http://www.experts-exchange.com/jsp/qShow.jsp?ta=win2k&qid=20297679

Netminder
CS Moderator
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
If you are looking at this article, you have most likely been hit by some version of ransomware and are trying to find out if there is anything you can do, or what way you should react - READ ON!
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question