Solved

W32time How do i know if it is encrypted?

Posted on 2011-02-15
9
475 Views
Last Modified: 2012-08-13
Our Domain Controller  time service is synchronizing the system time with the time source (pool.ntp.org)

How do i know if it is encrypted?
How do I know the Version?

I am on windows 2008 Server
0
Comment
Question by:pbtech
  • 6
  • 3
9 Comments
 
LVL 27

Expert Comment

by:Tolomir
ID: 34898529
why should it be encrypted, htis is a free service
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 34898616
did test on a German windows 7, see screenshot
15-02-2011-18-08-24.png
0
 

Author Comment

by:pbtech
ID: 34900050
I dont need to know about if it is encrypted.

How do i find out the version
0
 
LVL 27

Accepted Solution

by:
Tolomir earned 500 total points
ID: 34900158
there is version 3 released, and version 4 in development. So I guess, usually you should get v3  
0
Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

 

Author Comment

by:pbtech
ID: 34900190
Can i type something on teh server to display the version
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 34901128
Yes in fact you can. Make sure that the W32Time service is running.

Then enter on the shell




w32tm /config /syncfromflags:manual /manualpeerlist:"pool.ntp.org"
w32tm /config /reliable:YES /update
w32tm /resync

Open in new window

0
 
LVL 27

Expert Comment

by:Tolomir
ID: 34901163
and you get this:

149794 21:23:27.8620978s - | LeapIndicator: 0 - no warning;  VersionNumber: 3;  Mode: 4 - Server;  LiVnMode: 0x1C

Tolomir
149794 21:23:27.6530858s - Polling peer pool.ntp.org (ntp.m|0x0|0.0.0.0:123->108.71.253.20:123)
149794 21:23:27.6530858s - Peer poll: Max:1024.0000000s Cur:00.0000000s
149794 21:23:27.6530858s - PeerPollingThread: waiting 1024.000s
149794 21:23:27.8620978s - ListeningThread -- DataAvailEvent set for socket 1 (0.0.0.0:123)
149794 21:23:27.8620978s - ListeningThread -- response heard from 108.71.253.20:123 <- 10.161.134.2:123
149794 21:23:27.8620978s - /-- NTP Packet:
149794 21:23:27.8620978s - | LeapIndicator: 0 - no warning;  VersionNumber: 3;  Mode: 4 - Server;  LiVnMode: 0x1C
149794 21:23:27.8620978s - | Stratum: 1 - primary reference (syncd by radio clock)
149794 21:23:27.8620978s - | Poll Interval: 10 - 1024s;  Precision: -20 - 953.674ns per tick
149794 21:23:27.8620978s - | RootDelay: 0x0000.0000s - unspecified;  RootDispersion: 0x0000.0011s - 0.000259399s
149794 21:23:27.8620978s - | ReferenceClockIdentifier: 0x47505300 - source name: "GPS"
149794 21:23:27.8620978s - | ReferenceTimestamp:   0xD1056D4D9EF0B9C0 - 12942278605620860700ns - 149794 21:23:25.6208607s
149794 21:23:27.8620978s - | OriginateTimestamp:   0xD1056D4FA730A188 - 12942278607653085800ns - 149794 21:23:27.6530858s
149794 21:23:27.8620978s - | ReceiveTimestamp:     0xD1056D4F42756311 - 12942278607259603700ns - 149794 21:23:27.2596037s
149794 21:23:27.8620978s - | TransmitTimestamp:    0xD1056D4F427CED7E - 12942278607259718700ns - 149794 21:23:27.2597187s
149794 21:23:27.8620978s - >-- Non-packet info:
149794 21:23:27.8620978s - | DestinationTimestamp: 149794 21:23:27.8620978s - 0xD1056D4FDCB27100149794 21:23:27.8620978s -  - 12942278607862097800ns149794 21:23:27.8620978s -  - 149794 21:23:27.8620978s
149794 21:23:27.8620978s - | RoundtripDelay: 208897000ns (0s)
149794 21:23:27.8620978s - | LocalClockOffset: -497930600ns - 0:00.497930600s
149794 21:23:27.8630978s - \--

Open in new window

0
 

Author Comment

by:pbtech
ID: 34906461
When I type in the commands I get an "Access Denied" Message
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 34906603
you need administrator permissions for that
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Explore the encryption capabilities built into Google Apps and how these features can help you meet privacy policy and regulatory compliance, but are not a full solution. Understand and compare the most popular email encryption services for Google A…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
The viewer will learn how to create two correlated normally distributed random variables in Excel, use a normal distribution to simulate the return on different levels of investment in each of the two funds over a period of ten years, and, create a …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

24 Experts available now in Live!

Get 1:1 Help Now