thanks to marcel for pointing to another sharepoint resource site on the internet:

check it out: http://sharepoint.advis.ch/

last week (early last week) i was helping a client who's machine had been infected with a hack that was adding footers in the iis configuration of a site.  what this was doing was outputing javascript that was attempting to insert the download.ject virus on user machines that visited the site.

*last week* i noticed it and the companie's a/v software (mcafee) noticed it as JS/Exploit-DialogArg.B variant (not Download.Ject).  my a/v soft (norton desktop) didn't even notice it.  I could not find any information on the JS/Exploit-DialogArg.B virus def except on mcafee's site stating an “extremely low” warning.

guess what...it wasn't that “extremely low” -- as now download.ject (same thing) is all over the place...and this server *had* the appropriate suggested service pack from ms on it already.  i admit, the clients machine looked like a different hack to get in, but i found it interesting that just now a/v corps are heightening the threat...i contacted both symantec and mcafee with the copy of my variant and they responded with “this is already been designated a low warning as microsoft already has patches that solve this” -- argh.

i didn't know about these so i guess i might be “behind the curve” but i thought i'd point you to some sharepoint migration tools that are available on gotdotnet.

some include a sts2wss tool and others.

amazing...as if the guy doesn't have enough money, ben affleck wins the commerce casino poker championship...

c'mon ben...give the “regular” people a chance...or maybe you're just trying to get on tv because your j-lo video won't be playing much anymore...

hmm...note to self: if you ever date a famous person...don't tape any aspect of it...not just the “paris hilton” moments...none of it...i wonder what ben's new girlfriend thinks when seeing the bennifer moments on mtv...

okay, so what happens when you get the call that a netadmin changed the local security policy and they can't get in anymore.

no problem, log into another machine and terminal service in, right?

“interactive logon denied by local policy” -- uh oh.

okay, manage the machine (not part of a domain) remotely and add a new user that is in a different group and grant remote login rights.

“logon denied” -- hmmm...uh oh.

me: “did you change the policy to Everyone?”
netadmin: “i think so”
me: uh-oh.

thanks to a little googling and the resource kit i was able to find something i wasn't aware of before...the ntrights.exe tool...to change rights remotely.

guess what, it worked and saved this server BIG TIME.

anyhow, if you didn't know about it...it is something handy to have around.