Jump to content

Windows xp sharing


korgg
 Share

Recommended Posts

Thanks for the link ... I had a program like that at home ... Forgot about it :( ..

That was just what I needed for that problem ...

Still my problem remains ... Still looking for answers...Hope MS gets public with some hotfix ...

And I'm anxious about your opinion about that ethereal file...

Connected users can be seen in control panel -> administrative tools -> computer management -> shared folders....

The thing is that I tried to connect to a computer that has my problem and I got that message ... But in the sessions section it appeared as connected (I mean my computer connected to the problem computer )... Weird , really weird ! :(

Link to comment
Share on other sites

I have found it ! Long live GOOGLE.COM ....

that computer guy]Hey, just passing through, I just had this problem and I didn't know what it could be:

The problem being \\computername is not accessible. and/or your home network gives error 'Access is Denied. Please contact your system administrator.'

You may get that error if your LSA\restrictanonymous regkey is set to hexadecimal '1', which would be found at

HKLM\SYSTEM\CurrentControlSet\Control\Lsa\restrictanonymous. I set that to evade the common LSA exploit, but it messed up my home network, so I got a firewall and set it back to 0, now everything's fine again, and working properly.

bounce.gif

Hope that helps another user!

bye

Probably the hotfix for sasser did this or some worms after that ... Thanks a Lot guys ! ...

Link to comment
Share on other sites

News and updates about how I got my problem ... Sad but true ...

W32/Rbot-PN is an IRC backdoor Trojan and network worm.

W32/Rbot-PN may spread to remote network shares and computers vulnerable to common exploits. The worm also opens up a backdoor, allowing unauthorised remote access to infected computers via the IRC network, while running in the background as a service process.

W32/Rbot-PN copies itself to the Windows system folder and creates the following registry entries to run automatically on log-on:

HKCU\Software\Microsoft\Windows\CurrentVersion\Run\

Sygate Personal Firewall = "Sygate.exe"

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\

Sygate Personal Firewall= "Sygate.exe"

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices\

Sygate Personal Firewall = "Sygate.exe"

W32/Rbot-PN also attempts to set the following registry entries:

HKLM\SOFTWARE\Microsoft\Ole\

EnableDCOM = "N"

HKLM\SYSTEM\ControlSet001\Control\Lsa\

restrictanonymous = 1

HKLM\SYSTEM\CurrentControlSet\Control\Lsa\

restrictanonymous = 1

W32/Rbot-PN can receive commands from a remote intruder to delete network shares, log keypresses, participate in DDoS attacks, scan other computers for vulnerabilities, steal passwords, steal registration keys for computer games, create local administrator

accounts and capture video from webcameras attached to the computer.

More info at www.sophos.com

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue. Privacy Policy