This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author eryksun
Recipients eryksun, paul.moore, steve.dower, tim.golden, yan12125, zach.ware
Date 2015-12-24.23:55:57
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <1451001357.43.0.645894835157.issue25939@psf.upfronthosting.co.za>
In-reply-to
Content
psexec.exe can be run from the the live server.

    >>> subprocess.call(r'\\live.sysinternals.com\tools\psexec.exe -s whoami')

    PsExec v2.11 - Execute processes remotely
    Copyright (C) 2001-2014 Mark Russinovich
    Sysinternals - www.sysinternals.com


    nt authority\system
    whoami exited on THISPC with error code 0.
    0

But the executable could also be cached on the test system.
History
Date User Action Args
2015-12-24 23:55:57eryksunsetrecipients: + eryksun, paul.moore, tim.golden, zach.ware, steve.dower, yan12125
2015-12-24 23:55:57eryksunsetmessageid: <1451001357.43.0.645894835157.issue25939@psf.upfronthosting.co.za>
2015-12-24 23:55:57eryksunlinkissue25939 messages
2015-12-24 23:55:57eryksuncreate