Solved

wipe clues from server

Posted on 2002-05-22
9
154 Views
Last Modified: 2010-04-13
Hi experts, I need your help!!

I have recently switched on my win98 workstation, logged into the w2k server domain and then accessed and copied password protected data that I wasn't supossed to access.

Could w2k server had loged this operations (without 3rd party software)? If the answer is yes, where does it places the log files so I can clean them?




0
Comment
Question by:nasheerz
9 Comments
 
LVL 3

Expert Comment

by:Dmitriy
ID: 7027027
You can't.  And yes, the access is logged.  The auditing trail will show who logged on and did what with files.

P.S.  This sounds like hacking.  This site strictly forbids any topics with relevance to illegal activities.
0
 
LVL 9

Accepted Solution

by:
TooKoolKris earned 75 total points
ID: 7027060
I suggest you own up to your mistakes before they find you. If it's a critical thing it's going to be much better if you go to them instead of them coming to you. W2K definitely can't track all file access within it's logs and unless you're a Server Operator or a Domain Admin you aren't going to be able to clear the logs even if you do find out where they are. Smile your busted!

TooKoolKris
MCSE+I, CCNA, A+


0
 
LVL 9

Expert Comment

by:TooKoolKris
ID: 7027065
I meant to say that W2K definitely CAN track, sorry for the typo.

TooKoolKris
MCSE+I, CCNA, A+
0
 

Author Comment

by:nasheerz
ID: 7027615
I have administrator access to the server, so this has nothing of ilegal. Where are that logs located???
0
Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

 
LVL 9

Expert Comment

by:TooKoolKris
ID: 7027902
Ask your network administrator then.
0
 

Author Comment

by:nasheerz
ID: 7028047
Sorry ToolKoolKris but this site is for questions and answers, if you don't know the answer or if you don't want to help me with this trouble, just don't put more impertinent comments to me.

Thanks.



 
0
 
LVL 9

Expert Comment

by:TooKoolKris
ID: 7028164
This site is for questions and answers that's correct. However it's not for helping you cover your tracks when you accessed files you shouldn't have. Nobody on this site is going to help you in your quest to erase logs so that no one will know that you accessed files you shouldn't have. This question will also be notified to the site operators to see that it is properly deleted as well. Have a good day.

TooKoolKris
MCSE+I, CCNA, A+
0
 
LVL 7

Expert Comment

by:jmiller47
ID: 7028310
You stated that you accessed files you weren't supposed to. Therefore, you were doing something against company policy. It is against the morals of this board to answer any questions regarding covering up tracks, doing something you are not supposed to, or hacking. I don't think you'll get any answers here...
0
 
LVL 5

Expert Comment

by:Netminder
ID: 7028360
nasheerz,

The answers you've been given are the ones you're going to get; I've force-accepted accordingly.

I've been in Net Admin for a company which does a lot of work with banks and governments. One of my colleagues did exactly what you've done, and had he not gone to our boss and told him (he looked at the CEO's email) he'd have lost his job, even though he has full admin privileges.

The logs exist specifically to see who's doing what. You've done it. I think your course of action is clear. Further, I've alerted EE Admin to this question, and made a notation in your EE profile.

Dmitriy: points for you at http://www.experts-exchange.com/jsp/qShow.jsp?ta=win2k&qid=20303703
jmiller47: points for you at http://www.experts-exchange.com/jsp/qShow.jsp?ta=win2k&qid=20297679

Netminder
CS Moderator
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
What is Backup? Backup software creates one or more copies of the data on your digital devices in case your original data is lost or damaged. Different backup solutions protect different kinds of data and different combinations of devices. For e…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now