[windows2000] Re: OT: Yahoo Messenger...

  • From: "Mark Mucher" <mmucher@xxxxxxxxxxxxx>
  • To: <windows2000@xxxxxxxxxxxxx>
  • Date: Tue, 12 Aug 2003 10:22:54 -0400

Good!  Every company should do the same...  (I forgot to mention that the
policy should permit this kind of investigation,  all is company property,
etc.)

What is the name and location of the file?  I have a tool I'd like to try.

Mark


-----Original Message-----
From: windows2000-bounce@xxxxxxxxxxxxx
[mailto:windows2000-bounce@xxxxxxxxxxxxx] On Behalf Of Steve Rance
Sent: Tuesday, August 12, 2003 10:00 AM
To: windows2000@xxxxxxxxxxxxx
Subject: [windows2000] Re: OT: Yahoo Messenger...

yes every user has here has signed an agreement.

-----Original Message-----
From: Mark Mucher [mailto:mmucher@xxxxxxxxxxxxx]
Sent: 12 August 2003 14:46
To: windows2000@xxxxxxxxxxxxx
Subject: [windows2000] Re: OT: Yahoo Messenger...


I'm all for investigating this type of abuse, but do you have a company
policy, signed by him indicating receipt and agreement?

If not, you'd better stop now and consult a good labor attorney (good
attorney being an oxymoron <G> ).

Mark
 

-----Original Message-----
From: windows2000-bounce@xxxxxxxxxxxxx
[mailto:windows2000-bounce@xxxxxxxxxxxxx] On Behalf Of Steve Rance
Sent: Tuesday, August 12, 2003 9:40 AM
To: windows2000@xxxxxxxxxxxxx
Subject: [windows2000] Re: OT: Yahoo Messenger...

possible....but unlikely.

I have tried google, and various security sites before posting here.  I came
up with nothing.


-----Original Message-----
From: Costanzo, Ray [mailto:rcostanzo@xxxxxxxxxxx]
Sent: 12 August 2003 14:25
To: windows2000@xxxxxxxxxxxxx
Subject: [windows2000] Re: OT: Yahoo Messenger...


Maybe this is what the people really wrote.  ;]  I guess another thing you
could try is reading the files from his computer.  But I'm sure someone out
there on the Internet has information about how to read these files, so I
imagine that Google would turn up something.

Ray at work

> -----Original Message-----
> Yes they are logs of conversations.  They have a .dat extension.
> 
> I have installed YM on my pc and copied his archieve into mine.  When 
> I view his messages I get the following:
> 
> user (08:45:55): ptgEy&qmzt)*y3rBg:nfv+0gy nE0hum)%2&d+xJ tc $i 
> ouruser (08:49:17): Px' xi|"{;.elro frkgt6{gdb|E0v vl56/*|bHk
> ohh3 `oj w`cky (;m.
> user (08:50:25): v~|]6k}agt)0lqr {i*ap(2g`xx ouruser (08:51:26): q
> +Ksb(k/34 }`+Yz d%?6;"kgf_w.
> user (08:51:58): oydZ6udgj$(+i
> ouruser (08:52:04): pdiKo
> 
> At the end of the day, if my boss wants to read these messages this is 
> what I have to do.  I think that he may be concerned that our user has 
> used it to disclose information, as he knew email was tracked.
> 
> Steve

---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.509 / Virus Database: 306 - Release Date: 8/12/2003
 

********************************************************
This Week's Sponsor - RTO Software / TScale
What's keeping you from getting more from your terminal servers? Did you know, 
in most cases, CPU Utilization IS NOT the single biggest constraint to scaling 
up?! Get this free white paper to understand the real constraints & how to 
overcome them. SAVE MONEY by scaling-up rather than buying more servers.
http://www.rtosoft.com/Enter.asp?ID=148
**********************************************************
To Unsubscribe, set digest or vacation
mode or view archives use the below link.

http://thethin.net/win2000list.cfm

Other related posts: