Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Utility to determine who is logged on to a remote computer given its IP or name?

Posted on 2004-08-26
2
Medium Priority
?
278 Views
Last Modified: 2010-08-05
nbtstat is one that was used, but it does not work always.  Is there a utility that can be used for this? The workstation is XP Pro, NT network-
0
Comment
Question by:dunquen
2 Comments
 
LVL 2

Accepted Solution

by:
b0bmaster earned 2000 total points
ID: 11908475
Hi

I usualy use nbtstat also but there is a nice little utility called - NetUsers that i sometimes use, you can download it here:
   http://www.optimumx.com/download/#NetUsers

I also sometime use a little VBScript - Copy/Paste it to notepad and just Save it as "NetUserStat.vbs"

-----------------------------------------------------------------------------------------------------------

strComputer = InputBox("Enter Name Of Remote computer:")

Set objWMIService = GetObject("winmgmts:" & "{impersonationLevel=impersonate}!\\" & strComputer & "\root\cimv2")
Set colComputer = objWMIService.ExecQuery ("Select * from Win32_ComputerSystem")

For Each objComputer in colComputer
 Msgbox "Logged on user is:: " & objComputer.UserName
Next

------------------------------------------------------------------------------------------------------------

Hope I helped, Thanks
0
 
LVL 15

Expert Comment

by:mcp_jon
ID: 11911406
There is a tool called tcpview, which is a nbtstat in graphical view !

Very usefull, it lets you know the Ip's and ports they are using
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

ITIL has an elaborate incident management framework. This article serves as a starter for those who'd like to know more or need to suss out the baseline elements in a typical incident response execution plan on the "need to have" and the "good to ha…
It’s a season to be thankful, and we’re thankful for users like you who engage on site, solve technology problems, and network with others in the industry. What tech are we most thankful for? Keep reading.
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

577 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question