Solved

One of my Win2K server is being exploited

Posted on 2011-03-05
3
340 Views
Last Modified: 2012-05-11
I have an old w2k server that I have custom code on, that will not work on the newer OS's so, the server can't be upgraded, and I have maybe 5 independent companies working on multiple servers including this one on various projects.

Here is the problem, after a ton of implementation costs to upgrading the entire environment to be PCI compliant, I now have someone rewriting the credit card numbers back into our database, and several other reoccurring PCI violation exploits. Its not a bug it is very intentional but, by whom.

I'm afraid I have ticked off one of the consultants and he/she is looking to turn us in, so we take the massive hit from storing cc # in an non PCI compliant environment.

I need to track all interaction changes in/on a windows server 2000 (standard edition) in regards to custom jsp pages. I haven't been able to find anything that works in W2k environment, as far as intrusion detection or even access tracking. "Spector Pro Server"  unfortunately only works in a windows server 2003 (and up) environment.

Any suggestions? I am recreating the entire functionality in a private cloud but, I am absolutely not ready to bring it live.

Thanks for the input.
0
Comment
Question by:tra-mis
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 15

Accepted Solution

by:
Russell_Venable earned 500 total points
ID: 35046668
0
 

Author Closing Comment

by:tra-mis
ID: 35046676
Thank you very much for you help!
0
 
LVL 15

Expert Comment

by:Russell_Venable
ID: 35048136
Np.
0

Featured Post

Edgartown IT Case Study

Learn about Edgartown's quest to ensure the safety and security of the entire town's employee and citizen data. Read the case study!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When you are trying to access the server, have you ever encountered "The terminal server has exceeded the maximum number of allowed connection" error?  or "The user is attempting to log on to a Terminal Server in Remote Administration mode, but the …
The System Center Operations Manager 2012, known as SCOM, is a part of the Microsoft system center product that provides the user with infrastructure monitoring and application performance monitoring. SCOM monitors:   Windows or UNIX/LinuxNetwo…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question