Solved

finger command

Posted on 2003-11-08
6
281 Views
Last Modified: 2010-03-19
how do we run a finger command in win 2k professional? my computer is a ftp server and i want to know who is connected to to my system..


Thanx
0
Comment
Question by:Aiysha
6 Comments
 
LVL 49

Accepted Solution

by:
sunray_2003 earned 250 total points
ID: 9707890
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9707897
You may also want to use these tools

http://www.labmice.net/Utilities/networkmonitor.htm

Sunray
0
 

Expert Comment

by:jfchambers
ID: 9710818
By typing "netstat" from a command prompt, you can see the current connections that your server has.  This command does not tell the username but only the host and protocol being used.  What FTP server are you using?  IIS?  WAR?
0
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

 

Author Comment

by:Aiysha
ID: 9715288
I am using IIS.
0
 

Expert Comment

by:rockyt
ID: 9747625
hey,

    As such u nbtstat is good to finger out who is connected to u r pc. but if u really want to fingure out who and from where is connected u can use Blackice software. its one of the very good tool for intrusion detection. and i have catch 1 hacker with the help of that

Regds
Rockyt
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9943157
Thanks Aiysha

Sunray
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

This is an article about my experiences with remote access to my clients (so that I may serve them) and eventually to my home office system via Radmin Remote Control. I have been using remote access for over 10 years and have been improving my metho…
Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now