Well I think I'll call it quits on the Win32::Daemon. Actually got this working with Win32::Process...with a little weird thinking anyway.
Here's what I did. Total hack job, but it actually works.
use Win32::Process;
$proc = shift;
if ($proc ne run) {
Win32::Process::Create($Process...
Put them in the respective bin and site/lib directories.
Specifcally,
daemon.dll -> c:\perl\bin
daemon.pm -> c:\perl\site\lib\win32
Win32-Daemon.ppd -> c:\perl\site\lib\win32
daemon.pm in any other directory Perl cannot find it. With it in the above directory, I get the previously mentioned...
Can't even run that stuff. After installing it Here's the error I get.
Can't locate loadable object for module Win32::Daemon in @INC (@INC contains: C:
/Perl/lib C:/Perl/site/lib .) at daemon.pl line 1
Compilation failed in require at daemon.pl line 1
Even so, the issue seems to be the same...
I've got a perl script I'd like to run. Its an infinite loop script so starting it and leaving a command prompt open simply does not work for me. I'd like to be able to include something within the script that simply backgrounds the whole process.
I've been pointed to Win32::Process, but that...
I've been using the online tests @ cccure.org and also the practice tests in the Shon Harris all-in-one book. How well do these questions reflect the questions on the exam?
Are they way off, or generally on target?
I'll see your DMCA and raise you a First Amendment.
http://www.anti-dmca.org
Rogaine!
Anyway...www.ethereal.com
Its a packet sniffer. It'll let you look at the DNS queries to find out exactly what the servers are trying to do. Armed with this information, we can narrow down the search a bit and hopefully find an answer!
[thumbsup2]
I'll see your DMCA and raise you a...
You answered your own question there snoot. These 45 yr olds you speak of seem a bit overqualified for a network admin job (I'm assuming the masters is in IT). They would require more pay than you do with only an AS.
Alot of HR depts ask 'why does this overqualified person want a low-end job?'...
I disagree snootalope. There are some certs that are in fact totally bogus, and you don't need to really know the material to pass. The CCNA is quite different. Cisco does a great job at making sure you know your stuff in order to pass.
On another note though, certs are there to get you an...
If you need the knowledge go for the N+. If you already know it, but just want a cert, I wouldn't bother with the N+. If you know IP, and want to prove it. Go for the CCNA. That'll get you on your way to a network admin job.
I personally think the MCSE is a completely worthless cert. I know far...
Well, 192.175.48.1 is definately a dns root server.
( http://ws.arin.net/cgi-bin/whois.pl )
Looks like all your machines are trying to access it, not just your internal dns server.
I highly doubt this is suspicious traffic. So you may have better luck posting in the DNS forums.
A wild guess...
Step one - Lock out his account.
Step two - Go to his machine, and kick him off
Step three - Audit his entire PC
I'll see your DMCA and raise you a First Amendment.
http://www.anti-dmca.org
The insert string from an MS app to a mysql db looks like this:
insert ( `field1`, `field2`, `field3` ) values ( 'test1', test2, 'test3' )
See how the second value is not enclosed with ' marks?
Is it possible to force the mysql server or the MyODBC driver to force the values to be enclosed in...
I'm using MS ISA server, and am trying to configure it to log to a mysql database. MyODBC is installed, and the ISA server can connect (and authenticate) with the mysql server just fine. Once connected, the ISA server tries to insert data, but gets a syntax error response from the mysql server...
Does what? Protect your LAN? Its a firewall, so yes, it does...as long as you configure it properly.
I'll see your DMCA and raise you a First Amendment.
http://www.anti-dmca.org
As long as the NetBIOS protocols are filtered at the firewall you should be safe from external threats on those ports. Its not safe from internal threats though, but that probably isn't an issue for you...unless another pc on your LAN is compromised, then the webserver could be in...
Why are you running a webserver without a firewall? Get one, and only allow port 80 to the webserver. That will stop the attacks. Firewalls are cheap if not free.
Once that's done you can track attacks using the firewall logs.
Change your admin password. Better yet, rename the admin account...
Nevermind...
DC to DC conversations happen over null sessions. Disabling them would cripple a domain. Client to client null sessions? Domain authentication/printing perhaps?
You can restrict anonymous (null) authentication through the registry.
Just thought I'd relay my findings!
Baselining...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.