Quote: How does it work? The program works by copying files using the default C$ share, and using remote registry and service control manager to install and start a service. It then starts a local client to connect to the service. When you close the vncviewer window, the process is reversed - the remote service is stopped, removed, and files and registry settings are cleaned up. -----Original Message----- From: Condon, Mike [mailto:M1C@xxxxxxxxxxxxxxxxx] Sent: Thursday, November 06, 2003 9:52 AM To: 'windows2000@xxxxxxxxxxxxx' Subject: [windows2000] Re: Download Pick of the week: GenControl Yeah, thanks for the warning at least. What port does it use? -----Original Message----- From: Costanzo, Ray [mailto:rcostanzo@xxxxxxxxxxx] Sent: Thursday, November 06, 2003 9:48 AM To: windows2000@xxxxxxxxxxxxx Subject: [windows2000] Re: Download Pick of the week: GenControl It's a bit frightening to. Imagine this: net use \\randomIPAdddress\ipc$ /user:\\randomIPAddress\administrator [enter blank password] Connect with this. There are enough maniacs out there with computers with blank passwords and not behind a firewall, that this'll work... And you could easily loop through 100 IPs at a time or something to find ones that allow you to authenticate. EEGS. Ray at work > -----Original Message----- > From: Daniel Ensor [mailto:densor@xxxxxxxxx] > > > Oh my god Jim this is amazing. > Dan > > -----Original Message----- > From: Jim Kenzig http://thethin.net [mailto:jimkenz@xxxxxxxxxxxxxx] > > Alright this is an absolutely AWESOME (and a bit scary) > utility written in > TightVNC. It allows you to remote control ANY PC on your > network that you > have admin privileges to with NO client necessary and it is > my favorite > price FREE under GPL: > > http://www.gensortium.com/products/gencontrol.html > > **************************************************************************** ****************************** The information contained in this e-mail message is intended only for the personal and confidential use of the recipient(s) named above. Distribution, publication, or retransmission of this message is strictly prohibited. This message may be a bank to client communication and as such is priviliged and confidential. If the reader of this message is not the intended recipient or an agent responsible for delivering it to the intended recipient, you are hereby notified that you have received this document in error and that any review, dissemination, distribution, or copying of this message is strictly prohibited. If you have received this communication in error, please notify us immediately by e-mail, and delete the original message. The sender of this e-mail specifically "opts-out" of the Electronic Signatures and Global and National Commerce Act (E-Sign) and any and all similar state and federal acts. Accordingly, but without limitation, any and all documents, contracts, and ageements must contain a handwritten signature of the sender to be legal, valid, and enforceable. **************************************************************************** ****************************** ******************************************************** This Weeks Sponsor Pearl Software Internet Monitoring, Filtering, and Control Solutions Enabling User & Group Level Oversight & Access Policies Fully Functional in a Thick or Thin Client Environment http://www.pearlsw.com ********************************************************** To Unsubscribe, set digest or vacation mode or view archives use the below link. http://thethin.net/win2000list.cfm ******************************************************** This Weeks Sponsor Pearl Software Internet Monitoring, Filtering, and Control Solutions Enabling User & Group Level Oversight & Access Policies Fully Functional in a Thick or Thin Client Environment http://www.pearlsw.com ********************************************************** To Unsubscribe, set digest or vacation mode or view archives use the below link. http://thethin.net/win2000list.cfm CONFIDENTIALITY NOTICE - This e-mail transmission, and any documents, files or previous e-mail messages attached to it may contain information that is confidential or legally privileged. If you are not the intended recipient, or a person responsible for delivering it to the intended recipient, you are hereby notified that you must not read this transmission and that any disclosure, copying, printing, distribution or use of any of the information contained in or attached to this transmission is STRICTLY PROHIBITED. If you have received this transmission in error, please immediately notify the sender by telephone or return e-mail and delete the original transmission and its attachments without reading or saving in any manner. Thank you ******************************************************** This Weeks Sponsor Pearl Software Internet Monitoring, Filtering, and Control Solutions Enabling User & Group Level Oversight & Access Policies Fully Functional in a Thick or Thin Client Environment http://www.pearlsw.com ********************************************************** To Unsubscribe, set digest or vacation mode or view archives use the below link. http://thethin.net/win2000list.cfm