do you have antivirus software installed, macaffe and sophos had an update to handle the "use my stylesheet" trojan which did the same nasty things you described.
we used angryip (try a google search to locate and download this) run angryip or a network sniffer that shows port activity and pay attention to ports 4444, 707, and 69 if a machine is running traffic from these ports check the machine for the nachi
we have a SUS setup and it updated ok for a couple weeks but lately it has failed generating the following error message
24-Nov-2003 07:05:51 xyz.16.5.172 Initilization Succeeded
24-Nov-2003 07:05:51 xyz.16.5.172 Detection Failed (8007007e) Real time: 24-Nov-2003 07:05:51
we pointed it to our...
I have a user who claims that whenever he prints his applications just shut down, he claims it happens in Quark (no surprise here), office, and adobe suite products pretty much everything he uses. I have not physically witnessed this error but did reload the drivers for the printer for him, yet...
we had AD connecting through the MACS but they would lock up frequently, this procedure also requires some active directory schema admin actions you may need special priveledges (schema admin priveledges) to pull this off, we ended up removing the MACS, they would not play well on AD
have you checked task manager to see if there are any processes hogging ram or the processor? I have seen macafee take over the processor and machines were slowed down considerably.
we have people using a shared file on the network and when someone's pc locks up while using the file it will be stuck in that mode.
is there a way to unlock shared files (access, excell, word)
avoid the bootcamps that promise to teach you mcse in 6 weeks they go through the $200 books you can buy at most bookstores and charge you thousands, definetly not worth the wasted bucks for you or your company
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.