Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Utility to determine who is logged on to a remote computer given its IP or name?

Posted on 2004-08-26
2
Medium Priority
?
276 Views
Last Modified: 2010-08-05
nbtstat is one that was used, but it does not work always.  Is there a utility that can be used for this? The workstation is XP Pro, NT network-
0
Comment
Question by:dunquen
2 Comments
 
LVL 2

Accepted Solution

by:
b0bmaster earned 2000 total points
ID: 11908475
Hi

I usualy use nbtstat also but there is a nice little utility called - NetUsers that i sometimes use, you can download it here:
   http://www.optimumx.com/download/#NetUsers

I also sometime use a little VBScript - Copy/Paste it to notepad and just Save it as "NetUserStat.vbs"

-----------------------------------------------------------------------------------------------------------

strComputer = InputBox("Enter Name Of Remote computer:")

Set objWMIService = GetObject("winmgmts:" & "{impersonationLevel=impersonate}!\\" & strComputer & "\root\cimv2")
Set colComputer = objWMIService.ExecQuery ("Select * from Win32_ComputerSystem")

For Each objComputer in colComputer
 Msgbox "Logged on user is:: " & objComputer.UserName
Next

------------------------------------------------------------------------------------------------------------

Hope I helped, Thanks
0
 
LVL 15

Expert Comment

by:mcp_jon
ID: 11911406
There is a tool called tcpview, which is a nbtstat in graphical view !

Very usefull, it lets you know the Ip's and ports they are using
0

Featured Post

Ready for your healthcare security check-up?

In the past few years, healthcare organizations have become a prime target for advanced attacks. Does your organization have what it needs to defend itself? Schedule your healthcare security check-up today and download our free Healthcare Security Resource Kit today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware, the malware that locks down its victim’s files until they pay up, has always been a frustrating issue to deal with. However, a recent mobile ransomware will make the issue a little more personal… by sharing the victim’s mobile browsing h…
Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
In a question here at Experts Exchange (https://www.experts-exchange.com/questions/29062564/Adobe-acrobat-reader-DC.html), a member asked how to create a signature in Adobe Acrobat Reader DC (the free Reader product, not the paid, full Acrobat produ…

916 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question