soulx said:Well, When I need to get to C: on my school pcs, I just run a bat file that does thisThesolcity said:Hm, my school had me fix a couple problems and patch a security hole. This was after I made all computers in the school pop up with "U MAD?" and "Liquid Filth" playing in the background.![]()
The IT guy got mad though saying I broke all the computers. Funny thing is I don't know how he got hired, he thought Norton was the best AV and didn't know what Linux was.![]()
The majority of you guys seem extremely full of yourself.
"I'M SMARTER THAN THE IT GUY, HE DOESN'T KNOW AS MUCH AS ME, HE SHOULDN'T BE HIRED, HURR DURR"
At least at my college, they pretty much require full time IT guys to have some sort of computer science degree and some certificates relating to the position they want to apply for (like website, hardware, software.. etc) similar to a teacher that would require some sort of degree. It makes sense that it would be awkward for the student to know more than the instructor.
However, computer science is a large field of stuff. Things aren't always as narrowed as windows platforms. It's possible for an IT guy to be hired who specializes in coding and website design. So while students may be smarter with windows platforms, they may not be necessarily smarter with website design or coding in a specific language.
Plus, while building the group policy for servers, we pretty much find any possible hole we can and block it; but I still found one out where I can use sophos to scan a directory (which it has access to directories students can't), then generate a file that has access to restricted directories and be able to sneak in like that. So finding a hole doesn't make it necessarily smarter than IT guys but something as simple as mapped drives is a given.
QUOTE
start explorer.exe c:
Yep. Even more stupid then remapping the drive letter.
Though the only reason I need C: access was that they blocked mspaint and notepad exec.
I had to use the rightclick>new text file to make the .bat
That's pretty smart. In windows 2008 R2, pretty much all of the programs are ran under user level (except for a few programs like our anti-virus). Whatever the users can't do, batch files cannot do either (not to mention we have blocked batch files). Not only did we hide the C:\ from user view, we pretty much restricted all access. The only communication that can be made to the C: is the user profiles where it loads the desktop user's cannot write anything there (just read). Which is why the only available way to navigate onto the rest of the drive is the use with something that has native administration access (like an anti-virus cause it needs to be able to scan the system).
I'm like 100% sure we blocked off mapping drives, but it's something I got to check when I get into work. Not only can a user see the location of the network storage that the c: maps, but just mapping to r: would un-restrict it.

