Solved

Utility to determine who is logged on to a remote computer given its IP or name?

Posted on 2004-08-26
2
269 Views
Last Modified: 2010-08-05
nbtstat is one that was used, but it does not work always.  Is there a utility that can be used for this? The workstation is XP Pro, NT network-
0
Comment
Question by:dunquen
2 Comments
 
LVL 2

Accepted Solution

by:
b0bmaster earned 500 total points
ID: 11908475
Hi

I usualy use nbtstat also but there is a nice little utility called - NetUsers that i sometimes use, you can download it here:
   http://www.optimumx.com/download/#NetUsers

I also sometime use a little VBScript - Copy/Paste it to notepad and just Save it as "NetUserStat.vbs"

-----------------------------------------------------------------------------------------------------------

strComputer = InputBox("Enter Name Of Remote computer:")

Set objWMIService = GetObject("winmgmts:" & "{impersonationLevel=impersonate}!\\" & strComputer & "\root\cimv2")
Set colComputer = objWMIService.ExecQuery ("Select * from Win32_ComputerSystem")

For Each objComputer in colComputer
 Msgbox "Logged on user is:: " & objComputer.UserName
Next

------------------------------------------------------------------------------------------------------------

Hope I helped, Thanks
0
 
LVL 15

Expert Comment

by:mcp_jon
ID: 11911406
There is a tool called tcpview, which is a nbtstat in graphical view !

Very usefull, it lets you know the Ip's and ports they are using
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Big data transfers via information superhighways require special attention and protection. Learn more about the IT-regulations of the country where your server is located. Analyze cloud providers and their encryption systems for safe data transit. S…
These days, all we hear about hacktivists took down so and so websites and retrieved thousands of user’s data. One of the techniques to get unauthorized access to database is by performing SQL injection. This article is quite lengthy which gives bas…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
A simple description of email encryption using a secure portal service. This is one of the choices offered by The Email Laundry for email encryption. The other choices are pdf encryption which creates an encrypted pdf of your email and any attachmen…

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now