| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: Answer me this please? |
From: "Rich"
This is a multi-part message in MIME format.
------=_NextPart_000_003D_01C33C3B.AA844CC0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Since we never discussed access permissions I'll ignore the off topic =
mention of that.
The shell extension associated with the temporary internet files =
folder un-obfuscated the intentionally obfuscated physical view and =
presents information not available from the file system like the URL =
being cached and the cache expiration time. I can keep repeating this =
but it would help if you read what I wrote before you replied.
Rich
"Geo." wrote in message =
news:3efb80e7$1{at}w3.nls.net...
I still don't understand. If I ask to see something I'm not allowed to =
see
then I should get a "you aren't allowed" message and if I am allowed =
to see
it then I should see it. Why would explorer "obfuscate" my view of my
system, what kind of reasoning would lead to a behavior like that? =
This is
what I don't understand.
Geo. (I wasn't really directing the question at you, I was just asking =
a
question that needs asking)
"Rich" wrote in message news:3ef92524$1{at}w3.nls.net...
This directory has a custom viewer that shows a logical view of the
Internet cache and cookies instead of the intentionally obfuscated =
physical
view. It also adds information not stored with each file like the URL
cached by that file and the cache expiration time.
In Windows Server 2003 viewing another user's cache does not =
display the
logical view. In Windows 2000 I'm pretty sure it does. I don't know =
about
Windows XP.
In any event, Mike's claims were bogus though it is not clear if =
this is
due to his disregard for honesty or accuracy.
Rich
"Geo." wrote in message =
news:3ef8deab{at}w3.nls.net...
Why would explorer show you someplace different from what you asked =
to
see?
Geo.
"Rich" wrote in message news:3ef8bd8d$1{at}w3.nls.net...
That's particularly strange since cookies are not stored in that
location. Now if you tried looking with Explorer at that location =
for
another account, you would see the contents of the temporary =
Internet
files
and cookies for your own account.
Rich
"Mike '/m'" wrote in message
news:u6eefv8ulhlelnrsb37f5rl11afjjmcsqb{at}4ax.com...
I can't answer your question, but when I went looking on my box =
(W2K
SP2)
I found a bunch of cookies in the Local Settings|Temporary =
Internet
Files
folder of the Administrator. That's odd because I do not log in =
as
Administrator on this box.
/m
On Mon, 23 Jun 2003 11:29:08 -0500, "Glenn Meadows"
wrote:
>Why would the Local Settings/Temp folder of the =
Administrator.
have
>24,575 folders in it, taking up 1.67gb of space?
>
>What creates items in that location? I found copies of old =
Win95_X.cab
>files scattered throughout. Kept wondering where all my free =
space on
C
was
>going, as it was creeping down everyday, and the log files were =
NOT
filling
>it up.
>
>How did I find it? Mapped C of the server to my laptop, and ran =
Norton
>Utilities System Info against it, and used the DRIVE tab to LOOK =
at
what
was
>taking up space on the drive.
>
>24,575 folders, taking up 1.67 gb of space.
------=_NextPart_000_003D_01C33C3B.AA844CC0
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Since we
never discussed =
access=20
permissions I'll ignore the off topic mention of that.
The shell
extension =
associated with=20
the temporary internet files folder un-obfuscated the intentionally = obfuscated=20
physical view and presents information not available from the file = system like=20
the URL being cached and the cache expiration time. I can keep =
repeating=20
this but it would help if you read what I wrote before you =
replied.
Rich
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)SEEN-BY: 633/267 270 @PATH: 379/45 1 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.