sonic872 Posted May 3, 2003 Share Posted May 3, 2003 Нортона ми даде че имало опити да се вкара еди къв си там троянец в компа ми inetnum: 217.10.247.0 - 217.10.249.255 netname: EVROCOM-NET descr: EUROCOM Plovdiv Ltd. country: BG admin-c: VV1423-RIPE tech-c: VV1423-RIPE status: ASSIGNED PA notify: veno@evrocom.net mnt-by: EVROCOM-MNT changed: veno@evrocom.net 20030320 source: RIPE Информация за компа от който е пуснато това.... Кажете ми нортона ли греши или ги вкарвате в навсички клиенти тия глупости Link to comment Share on other sites More sharing options...
Godfather Posted May 3, 2003 Share Posted May 3, 2003 Нортона ми даде че имало опити да се вкара еди къв си там троянец в компа ми inetnum: 217.10.247.0 - 217.10.249.255 netname: EVROCOM-NET descr: EUROCOM Plovdiv Ltd. country: BG admin-c: VV1423-RIPE tech-c: VV1423-RIPE status: ASSIGNED PA notify: veno@evrocom.net mnt-by: EVROCOM-MNT changed: veno@evrocom.net 20030320 source: RIPE Информация за компа от който е пуснато това.... Кажете ми нортона ли греши или ги вкарвате в навсички клиенти тия глупости Приятелю, това, което си постнал е просто един Whois query резултат (За тези, които не знаят, това показва, коя мрежа от IP адреси на коя организация е регистрирана и си е публично достъпна) Ако нортона ти дава такива съобщения, баси информацията , виж нещо друго да не е казал Link to comment Share on other sites More sharing options...
sonic872 Posted May 3, 2003 Author Share Posted May 3, 2003 Много добре знам какво съм написал просто сега не знам от къде да вида кво беше.... Нещо си и накрая Trojan Horse.. Бал съм го Link to comment Share on other sites More sharing options...
fon_tomov Posted May 3, 2003 Share Posted May 3, 2003 E ti kak iskash da ti otgovoriat na vaprosa kato ne si go zatal dokrai. Link to comment Share on other sites More sharing options...
Godfather Posted May 3, 2003 Share Posted May 3, 2003 Дай му един цялостен скан, може пък да извади нещо Link to comment Share on other sites More sharing options...
sonic872 Posted May 3, 2003 Author Share Posted May 3, 2003 Ма аз не съм го хванал така че и да му направя скан нищо няма да покаже... Norton Internet Security 2003 Proffesional за какво мислиш е?- намалява максимално възможността да хванеш някав червей или нещо от рода. Link to comment Share on other sites More sharing options...
Godfather Posted May 3, 2003 Share Posted May 3, 2003 Ма аз не съм го хванал така че и да му направя скан нищо няма да покаже...Norton Internet Security 2003 Proffesional за какво мислиш е?- намалява максимално възможността да хванеш някав червей или нещо от рода. Добре де, ама ако има някакъв опит за вмъкване на червей, най-малкото трябва да дава някакъв конкретен IP адрес, пък бил той и спуфнат. Това Whois е направо смешно и не на място Link to comment Share on other sites More sharing options...
sonic872 Posted May 3, 2003 Author Share Posted May 3, 2003 Незнам кво му има на Whois-a ма който го ползва си го знае... В System Tray-а си дава една удивителна и кат го пуснеш ти дава High Risc или нещо такова беше и ти дава информация от кое IP e и какво е - червейче ли е, конче ли е и т.н... ма аз кът съм птост го затворих и ся незнам как да го вида кво беше Link to comment Share on other sites More sharing options...
Godfather Posted May 3, 2003 Share Posted May 3, 2003 Незнам кво му има на Whois-a ма който го ползва си го знае... В System Tray-а си дава една удивителна и кат го пуснеш ти дава High Risc или нещо такова беше и ти дава информация от кое IP e и какво е.. ма аз кът съм птост го затворих и ся незнам как да го вида Абе по принцип не го ползвам това софтуерче, ама си мисля, че все пак трябва да оставя някякви логове, виж там по фолдерите за някаква следа, всеки сериозен security software трябва да прави такива логове. Link to comment Share on other sites More sharing options...
sonic872 Posted May 3, 2003 Author Share Posted May 3, 2003 аммм.. има само някви лицензи и глупости.. и тва: ============================================================================= Log Exporter June 13, 2002 © 2002 Symantec Corporation ============================================================================= Topics include: - Usage - Command Line Parameters - Export Filters - Wildcards - Samples ======================= Usage ======================= LogExprt.exe [-v] [-l{LOG}] [-x{FILE}] [-d{DELIMITER}] [-f{[+/-],Col,Data}] ======================= Command Line Parameters ======================= All command line parameters can be placed in quotes, in part or whole if spaces need to be specified. Parameter Usage ---------------------------------------------------------------------------- -v View Command. If a LogID is specified with the -l command, this command lists the columns of the specified log. If a LogID is not specified, this command lists all available logs. -l{LogID} Specifies which log the other commands are for. LogID value should be one of the four-digit values representing the each log, such as 0009 for Alerts log. -x{FILE} Export Command. Exports the log specified with the -l command. If FILE is not specified, the log file name is used with .txt appended to the end of it. -d{DELIMITER} Specifies what single character to use as a delimiter when exporting the log. If -d command is not used, the default delimiter used will be the comma "," character (no quotes, just the comma). Quotes " cannot and should not be used, nor should any DBCS character be used as a delimeter symbol. -f{[+/-],Col,Data} Optional Filter Command. This command allows the user to filter the data that is exported. See the "Export Filters" section for more details. ======================= Export Filters ======================= -f{[+,-],Col,Data} + and - The + (plus) and - (minus) modifiers on the filters allows the user to specify what type of filter this is. + filters specify that NO event log entries will be exported unless it matches all + filters. - filters specify that ALL event log entries will be exported unless it matches any - filter. Col Specifies which column this filter applies to. To get a list of columns, use the -v command line parameter. Wildcards may be used for this field. This field is not case sensitive. Data Specifies the data to look for in the specified column. This data must be found in the column for the filter to take effect. Wildcards may be used for this field. This field is not case sensitive. When using multiple filters, if any filter excludes an event log entry, the entry is excluded regardless of included filters. For this reason, the order in which the user specifies filters is important. For example, the following two filters will produce different output if they are swapped: -f"+,remote,internal*" -f"-,Date,10/23*" -f"-,Date,10/23*" -f"+,remote,internal*" ======================= Wildcards ======================= The following wildcards can be used in the Col and Data fields of export filters: * Matches any sequence of characters (zero or more). ? Matches any single character. Suppresses syntactic significance of a special character. [<set>] Matches any character in the specified set. [!<set>] or [^<set>] Matches any character not in the specified set. A set is composed of characters or ranges; a range looks like 'character hyphen character', as in '0-9' or 'A-Z'. Any ASCII character can be used in a set or a range. To suppress the special syntactic significance of any of '][*?!^-', and match the character exactly, precede it with a ''. Examples -------- 10/2?/01 Would match all days between the 20th and the 29th in October of 2001. Note: 10/2[0-9]/01 would accomplish the same thing. 10/*/01 Would match any day in October of 2001. *.domain.com Would match any DNS entry that ended with domain.com. 192.168.*.* Would match all IP addresses that begin with 192.168. Note: 192.168* would accomplish the same thing. *.*.1.100 Would match all IP address that end with 1.100. Note: *.1.100 would accomplish the same thing. 192.168.23[012].* Would match all IP addresses that begin with 192.168.230, 192.168.231, and 192.168.232. 192.168.10[0-6].* Would match all IP addresses between 192.168.100.000 and 192.168.106.255. ======================= Samples ======================= LogExprt.exe -v This command would list the available logs. The following is an example of the text output from this command: Available Logs: 0001 - Content Blocking 0002 - Connections 0003 - Firewall 0004 - Intrusion Detection 0005 - Privacy 0006 - Restrictions 0007 - System 0008 - Web History 0009 - Alerts 0011 - Confidential Info 0012 - Spam LogExprt.exe -v -l0001 This would list the columns in the "Content Blocking" log. LogExprt.exe -x -l0002 This would export the "Connections" log to a comma delimited file named "Connections.txt" in the current directory. LogExport.exe -x"c:log.txt" -l0007 This would export the "System" log to a comma delimited log file named "log.txt" in the root of the "C:" drive. LogExprt.exe -x -l0009 -d"~" This would export the "Alerts" log to a tilde delimited file named "Alerts.txt" in the current directory. LogExprt.exe -x -l0003 -f"+,Date,1/*/2002" This would export the "Firewall" log to a comma delimited file named "Firewall.txt" in the current directory. Only entries created during January 2002 will be exported to the file. LogExprt.exe -x -l0003 -f"+,Date,1/*/2002" -f"+,Message,*IEXPLORE*" This would export the "Firewall" log to a comma delimited file named "Firewall.txt" in the current directory. Only entries created during January 2002 that contain the word "IEXPLORE" in the message column will be exported to the file. Само че така ме мързи даже да го чета.. така че ако е правил нещо да каже... кой знае може човека да е фанал нещо и тва само да се разпространява по мрежата... Link to comment Share on other sites More sharing options...
Godfather Posted May 3, 2003 Share Posted May 3, 2003 Ха, ми тогава давай командата "LogExprt.exe -v" и трябва да покаже логовете Link to comment Share on other sites More sharing options...
asylum Posted May 3, 2003 Share Posted May 3, 2003 F.U.C.K. NORTON! Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.