Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Hard to believe this was in the Wall Street Journal

Hard to believe this was in the Wall Street Journal

Scheduled Pinned Locked Moved The Lounge
javahtmlcomsecuritytutorial
53 Posts 31 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J JimmyRopes

    Ten Things Your IT Department Won't Tell You[^] I find it hard to believe this was in a reputable publication like the Wall Street Journal. :sigh: This is irresponsible. X| It basically tells you how to bypass your company's security procedures. :rolleyes: 1. HOW TO SEND GIANT FILES 2. HOW TO USE SOFTWARE THAT YOUR COMPANY WON'T LET YOU DOWNLOAD 3. HOW TO VISIT THE WEB SITES YOUR COMPANY BLOCKS 4. HOW TO CLEAR YOUR TRACKS ON YOUR WORK LAPTOP 5. HOW TO SEARCH FOR YOUR WORK DOCUMENTS FROM HOME 6. HOW TO STORE WORK FILES ONLINE 7. HOW TO KEEP YOUR PRIVACY WHEN USING WEB EMAIL 8. HOW TO ACCESS YOUR WORK EMAIL REMOTELY WHEN YOUR COMPANY WON'T SPRING FOR A BLACKBERRY 9. HOW TO ACCESS YOUR PERSONAL EMAIL ON YOUR BLACKBERRY 10. HOW TO LOOK LIKE YOU'RE WORKING

    Simply Elegant Designs JimmyRopes Designs
    Think inside the box! ProActive Secure Systems
    I'm on-line therefore I am. JimmyRopes

    D Offline
    D Offline
    Duncan Edwards Jones
    wrote on last edited by
    #11

    If you sell your newspaper to Rupert Murdoch then this is what you get.

    '--8<------------------------ Ex Datis: Duncan Jones Merrion Computing Ltd

    E 1 Reply Last reply
    0
    • C Chris Austin

      JimmyRopes wrote:

      I find it hard to believe this was in a reputable publication like the Wall Street Journal. This is irresponsible.

      A bit melodramatic don't you think. There is nothing remotely new or novel about any on the items described. I'd figure any windows user with half a brain could figure most if not all of these items out on their own.

      My Blog A human being should be able to change a diaper, plan an invasion, butcher a hog, conn a ship, design a building, write a sonnet, balance accounts, build a wall, set a bone, comfort the dying, take orders, give orders, cooperate, act alone, solve equations, analyze a new problem, pitch manure, program a computer, cook a tasty meal, fight efficiently, die gallantly. Specialization is for insects. - -Lazarus Long

      H Offline
      H Offline
      hairy_hats
      wrote on last edited by
      #12

      Chris Austin wrote:

      any windows user with half a brain

      Ah, well, there's your problem.  "User" and "brain" don't usually appear that close together.

      1 Reply Last reply
      0
      • J JimmyRopes

        Ten Things Your IT Department Won't Tell You[^] I find it hard to believe this was in a reputable publication like the Wall Street Journal. :sigh: This is irresponsible. X| It basically tells you how to bypass your company's security procedures. :rolleyes: 1. HOW TO SEND GIANT FILES 2. HOW TO USE SOFTWARE THAT YOUR COMPANY WON'T LET YOU DOWNLOAD 3. HOW TO VISIT THE WEB SITES YOUR COMPANY BLOCKS 4. HOW TO CLEAR YOUR TRACKS ON YOUR WORK LAPTOP 5. HOW TO SEARCH FOR YOUR WORK DOCUMENTS FROM HOME 6. HOW TO STORE WORK FILES ONLINE 7. HOW TO KEEP YOUR PRIVACY WHEN USING WEB EMAIL 8. HOW TO ACCESS YOUR WORK EMAIL REMOTELY WHEN YOUR COMPANY WON'T SPRING FOR A BLACKBERRY 9. HOW TO ACCESS YOUR PERSONAL EMAIL ON YOUR BLACKBERRY 10. HOW TO LOOK LIKE YOU'RE WORKING

        Simply Elegant Designs JimmyRopes Designs
        Think inside the box! ProActive Secure Systems
        I'm on-line therefore I am. JimmyRopes

        S Offline
        S Offline
        Sam_c
        wrote on last edited by
        #13

        :laugh: none of that works here, there all to smart its the old saying "you cant kid those who have kidded thousands" number 10 is brill, alt tab so the boss looks at your task bar, even worse if you have duel screens and it only sets focus to an app in the other screen :laugh: though i do think it teachs bad working habbits and its a bit shocking for the wall street journal X|

        Code Project Lounge 101 by John Cardinal

        1 Reply Last reply
        0
        • J JimmyRopes

          Ten Things Your IT Department Won't Tell You[^] I find it hard to believe this was in a reputable publication like the Wall Street Journal. :sigh: This is irresponsible. X| It basically tells you how to bypass your company's security procedures. :rolleyes: 1. HOW TO SEND GIANT FILES 2. HOW TO USE SOFTWARE THAT YOUR COMPANY WON'T LET YOU DOWNLOAD 3. HOW TO VISIT THE WEB SITES YOUR COMPANY BLOCKS 4. HOW TO CLEAR YOUR TRACKS ON YOUR WORK LAPTOP 5. HOW TO SEARCH FOR YOUR WORK DOCUMENTS FROM HOME 6. HOW TO STORE WORK FILES ONLINE 7. HOW TO KEEP YOUR PRIVACY WHEN USING WEB EMAIL 8. HOW TO ACCESS YOUR WORK EMAIL REMOTELY WHEN YOUR COMPANY WON'T SPRING FOR A BLACKBERRY 9. HOW TO ACCESS YOUR PERSONAL EMAIL ON YOUR BLACKBERRY 10. HOW TO LOOK LIKE YOU'RE WORKING

          Simply Elegant Designs JimmyRopes Designs
          Think inside the box! ProActive Secure Systems
          I'm on-line therefore I am. JimmyRopes

          V Offline
          V Offline
          Vasudevan Deepak Kumar
          wrote on last edited by
          #14

          Sometimes people do such mean base things to solicit and gain cheap publicity. :)

          Vasudevan Deepak Kumar Personal Homepage Tech Gossips

          1 Reply Last reply
          0
          • J JimmyRopes

            Ten Things Your IT Department Won't Tell You[^] I find it hard to believe this was in a reputable publication like the Wall Street Journal. :sigh: This is irresponsible. X| It basically tells you how to bypass your company's security procedures. :rolleyes: 1. HOW TO SEND GIANT FILES 2. HOW TO USE SOFTWARE THAT YOUR COMPANY WON'T LET YOU DOWNLOAD 3. HOW TO VISIT THE WEB SITES YOUR COMPANY BLOCKS 4. HOW TO CLEAR YOUR TRACKS ON YOUR WORK LAPTOP 5. HOW TO SEARCH FOR YOUR WORK DOCUMENTS FROM HOME 6. HOW TO STORE WORK FILES ONLINE 7. HOW TO KEEP YOUR PRIVACY WHEN USING WEB EMAIL 8. HOW TO ACCESS YOUR WORK EMAIL REMOTELY WHEN YOUR COMPANY WON'T SPRING FOR A BLACKBERRY 9. HOW TO ACCESS YOUR PERSONAL EMAIL ON YOUR BLACKBERRY 10. HOW TO LOOK LIKE YOU'RE WORKING

            Simply Elegant Designs JimmyRopes Designs
            Think inside the box! ProActive Secure Systems
            I'm on-line therefore I am. JimmyRopes

            S Offline
            S Offline
            Software_Specialist
            wrote on last edited by
            #15

            I can't even access Proxy.org site :( So there is no chance to access other sites... Not a good option... My 1 -- modified at 5:04 Thursday 2nd August, 2007

            E 1 Reply Last reply
            0
            • C Chris Austin

              JimmyRopes wrote:

              I find it hard to believe this was in a reputable publication like the Wall Street Journal. This is irresponsible.

              A bit melodramatic don't you think. There is nothing remotely new or novel about any on the items described. I'd figure any windows user with half a brain could figure most if not all of these items out on their own.

              My Blog A human being should be able to change a diaper, plan an invasion, butcher a hog, conn a ship, design a building, write a sonnet, balance accounts, build a wall, set a bone, comfort the dying, take orders, give orders, cooperate, act alone, solve equations, analyze a new problem, pitch manure, program a computer, cook a tasty meal, fight efficiently, die gallantly. Specialization is for insects. - -Lazarus Long

              J Offline
              J Offline
              jhwurmbach
              wrote on last edited by
              #16

              Chris Austin wrote:

              I'd figure any windows user with half a brain could figure

              Sure, but it was in Wall Street Journal. Thats a publication for carefully selected extra-brainless people. :)


              Failure is not an option - it's built right in.

              1 Reply Last reply
              0
              • J JimmyRopes

                Ten Things Your IT Department Won't Tell You[^] I find it hard to believe this was in a reputable publication like the Wall Street Journal. :sigh: This is irresponsible. X| It basically tells you how to bypass your company's security procedures. :rolleyes: 1. HOW TO SEND GIANT FILES 2. HOW TO USE SOFTWARE THAT YOUR COMPANY WON'T LET YOU DOWNLOAD 3. HOW TO VISIT THE WEB SITES YOUR COMPANY BLOCKS 4. HOW TO CLEAR YOUR TRACKS ON YOUR WORK LAPTOP 5. HOW TO SEARCH FOR YOUR WORK DOCUMENTS FROM HOME 6. HOW TO STORE WORK FILES ONLINE 7. HOW TO KEEP YOUR PRIVACY WHEN USING WEB EMAIL 8. HOW TO ACCESS YOUR WORK EMAIL REMOTELY WHEN YOUR COMPANY WON'T SPRING FOR A BLACKBERRY 9. HOW TO ACCESS YOUR PERSONAL EMAIL ON YOUR BLACKBERRY 10. HOW TO LOOK LIKE YOU'RE WORKING

                Simply Elegant Designs JimmyRopes Designs
                Think inside the box! ProActive Secure Systems
                I'm on-line therefore I am. JimmyRopes

                P Offline
                P Offline
                Paul Watson
                wrote on last edited by
                #17

                I see your company IT policy, which you haven't subverted yet, includes TYPING IN CAPITALS. (You do make a slight point though. Companies need to change but through proper process not through subversion.)

                regards, Paul Watson Ireland & South Africa

                Shog9 wrote:

                And with that, Paul closed his browser, sipped his herbal tea, fixed the flower in his hair, and smiled brightly at the multitude of cute, furry animals flocking around the grassy hillside where he sat coding Ruby on his Mac...

                J 1 Reply Last reply
                0
                • S standgale

                  I think you over-estimate the ability of the average Windows user by a great deal. My experience is that most windows users can open their web browser - if it's in exactly the same place as last time. Anything beyond that quickly becomes increasingly unlikely. On the other hand, it is surprising what a completely clueless person can learn to do if it lets them get around security and policy restrictions.

                  "Your typical day is full of moments where you ask for a cup of coffee and someone hands you a bag of nails." - Scott Adams

                  C Offline
                  C Offline
                  Colin Angus Mackay
                  wrote on last edited by
                  #18

                  standgale wrote:

                  On the other hand, it is surprising what a completely clueless person can learn to do if it lets them get around security and policy restrictions.

                  Absolutely.


                  Upcoming events: * Glasgow: Mock Objects, SQL Server CLR Integration, Reporting Services, db4o, Dependency Injection with Spring ... "I wouldn't say boo to a goose. I'm not a coward, I just realise that it would be largely pointless." My website

                  1 Reply Last reply
                  0
                  • E Emilio Garavaglia

                    That's partially true. IT departments are not "self-made": they are organization belonging to structures whose activities are decided by the company "tecnocracy" that basically say what an employ of a given department should or shouldn't do. And that's valid for IT as well, that are explicitly required to contain the IT costs in certain budgets and to assure that a given activity that shouldn't be done cannot in fact be done. The "arbitrary rules bored bureaucrats use to make my life difficult" don't come from the IT itself, but from per personnel department, that ask the IT to find out the technical way to implement such rules. I perfectly agree that "When a sales person calls up, irate because the proposal he spent the night putting together was stripped out ... ", but if the IT has a limited spending capabilities, it cannot continuously buy hard disks to store the "infinite history" of the company employees life inside the e-mail databases. Even Google gmail has a limit about attachment sizes. The real problem is -probably- that who fixes such limits (the "spending limits" not the mailboxes: personnel, budget and control etc.) is not really aware of what the activity of the people are and what the kind of resource they are required to use are. These problems will probably self-disappear after certain "paper generation people" will left certain key position in the companies. By me, the reason I've to invest in managing comapny PC owned by people tha tare perfacly able to manage their home PC themself is an overkill. I'll probably spend more in infrastructure letting the user self-manage their own end let themselves pay for assistance if they require. But this is a completly different culture about the relation between company and technology.

                    2 bugs found. > recompile ... 65534 bugs found. :doh:

                    M Offline
                    M Offline
                    mintxelas
                    wrote on last edited by
                    #19

                    I was once asked to block certain pages (read: porn) to all the users in a factory (1200+) because they were absorving a large amount of bandwidth, **except** for the 6 executives' computers. Those had full free access to anything. After performing the task, logs showed a decrease in 4% to the amount of hits to those pages. That is, those who where so worried that their employees lost time watching porn where the ones actually causing the trouble! No more comments :P

                    J 1 Reply Last reply
                    0
                    • C Chris Austin

                      JimmyRopes wrote:

                      I didn't say any of this was new or novel in any way for an IT professional. I am just surprised at the Wall Street Journal advocating something like this.

                      To me this is no big deal. Hell, I was a user that did stuff like this when the pricks in the IT dept refused to do something silly like allow the devs to browse MSDN. The problem isn't the users, the problem is the IT departments like this. Rather than doing their job and meeting their users needs they become a self serving wanna-be programmer elitist group.

                      JimmyRopes wrote:

                      As I said before, it's irresponsible.

                      I still maintain that you are being melodramatic. [EDIT]

                      JimmyRopes wrote:

                      I didn't say any of this was new or novel in any way for an IT professional.

                      BTW, I am not an IT professional. I am a software developer.

                      My Blog A human being should be able to change a diaper, plan an invasion, butcher a hog, conn a ship, design a building, write a sonnet, balance accounts, build a wall, set a bone, comfort the dying, take orders, give orders, cooperate, act alone, solve equations, analyze a new problem, pitch manure, program a computer, cook a tasty meal, fight efficiently, die gallantly. Specialization is for insects. - -Lazarus Long

                      M Offline
                      M Offline
                      Mark_Wallace
                      wrote on last edited by
                      #20

                      Chris Austin wrote:

                      The problem isn't the users, the problem is the IT departments like this. Rather than doing their job and meeting their users needs they become a self serving wanna-be programmer elitist group.

                      Surely you're aware that company computer networks exist solely and only for the benefit of the SysAdmin staff! If it weren't for all those blasted users, messing around and requesting things that a system adminstrator would never need or use, every company would have a perfect intranet. Get with the program, eh?

                      1 Reply Last reply
                      0
                      • S Stuart Dootson

                        My 5 ....mainly because I work for a company with strict IT security policies. I've had attachments stripped out of e-mails sent me by suppliers, my e-mails from home to myself at work get blocked (don't ask me why or how) and yet...I still get spam. Security, eh?  (OK, I know security != spam filter, but honestly, if they could only try to do half as well as a free service like Gmail, we'd be getting somewhere). At least they were willing to unblock CP when Websense arbitrarily decided to block it...Websense's reason for blocking? CP was in that set of dangerous websites belonging to the 'Uncategorized' category.

                        M Offline
                        M Offline
                        Mark_Wallace
                        wrote on last edited by
                        #21

                        Stuart Dootson wrote:

                        At least they were willing to unblock CP when Websense arbitrarily decided to block it...Websense's reason for blocking? CP was in that set of dangerous websites belonging to the 'Uncategorized' category.

                        CP has now been categorized? I wondered why there were tears coming to its eyes.

                        1 Reply Last reply
                        0
                        • J JimmyRopes

                          Ten Things Your IT Department Won't Tell You[^] I find it hard to believe this was in a reputable publication like the Wall Street Journal. :sigh: This is irresponsible. X| It basically tells you how to bypass your company's security procedures. :rolleyes: 1. HOW TO SEND GIANT FILES 2. HOW TO USE SOFTWARE THAT YOUR COMPANY WON'T LET YOU DOWNLOAD 3. HOW TO VISIT THE WEB SITES YOUR COMPANY BLOCKS 4. HOW TO CLEAR YOUR TRACKS ON YOUR WORK LAPTOP 5. HOW TO SEARCH FOR YOUR WORK DOCUMENTS FROM HOME 6. HOW TO STORE WORK FILES ONLINE 7. HOW TO KEEP YOUR PRIVACY WHEN USING WEB EMAIL 8. HOW TO ACCESS YOUR WORK EMAIL REMOTELY WHEN YOUR COMPANY WON'T SPRING FOR A BLACKBERRY 9. HOW TO ACCESS YOUR PERSONAL EMAIL ON YOUR BLACKBERRY 10. HOW TO LOOK LIKE YOU'RE WORKING

                          Simply Elegant Designs JimmyRopes Designs
                          Think inside the box! ProActive Secure Systems
                          I'm on-line therefore I am. JimmyRopes

                          E Offline
                          E Offline
                          ednrgc
                          wrote on last edited by
                          #22

                          I guess they're getting ready for the Murdock era. Wait until you see "bat boy found" on the cover of the WSJ. It's just a matter of time.

                          1 Reply Last reply
                          0
                          • S Software_Specialist

                            I can't even access Proxy.org site :( So there is no chance to access other sites... Not a good option... My 1 -- modified at 5:04 Thursday 2nd August, 2007

                            E Offline
                            E Offline
                            ednrgc
                            wrote on last edited by
                            #23

                            So, you voted a 1 because you dont have access to proxy.org??? That's a reason?? :confused::wtf::confused::wtf:

                            1 Reply Last reply
                            0
                            • D Duncan Edwards Jones

                              If you sell your newspaper to Rupert Murdoch then this is what you get.

                              '--8<------------------------ Ex Datis: Duncan Jones Merrion Computing Ltd

                              E Offline
                              E Offline
                              ednrgc
                              wrote on last edited by
                              #24

                              Exactly. I wish I read this before posting my response.

                              1 Reply Last reply
                              0
                              • J JimmyRopes

                                Ten Things Your IT Department Won't Tell You[^] I find it hard to believe this was in a reputable publication like the Wall Street Journal. :sigh: This is irresponsible. X| It basically tells you how to bypass your company's security procedures. :rolleyes: 1. HOW TO SEND GIANT FILES 2. HOW TO USE SOFTWARE THAT YOUR COMPANY WON'T LET YOU DOWNLOAD 3. HOW TO VISIT THE WEB SITES YOUR COMPANY BLOCKS 4. HOW TO CLEAR YOUR TRACKS ON YOUR WORK LAPTOP 5. HOW TO SEARCH FOR YOUR WORK DOCUMENTS FROM HOME 6. HOW TO STORE WORK FILES ONLINE 7. HOW TO KEEP YOUR PRIVACY WHEN USING WEB EMAIL 8. HOW TO ACCESS YOUR WORK EMAIL REMOTELY WHEN YOUR COMPANY WON'T SPRING FOR A BLACKBERRY 9. HOW TO ACCESS YOUR PERSONAL EMAIL ON YOUR BLACKBERRY 10. HOW TO LOOK LIKE YOU'RE WORKING

                                Simply Elegant Designs JimmyRopes Designs
                                Think inside the box! ProActive Secure Systems
                                I'm on-line therefore I am. JimmyRopes

                                D Offline
                                D Offline
                                David Veeneman
                                wrote on last edited by
                                #25

                                Ask yourself why it is that users are so intent on bypassing IT security. I would submit that it is because IT is viewed as a tyranny with no regard for end users. In the eyes of many end users, IT has siezed power and used it to try to control workers, rather than serving the common goal. Mind you, I'm not saying this is the way it is, only that it is perceived as such by office workers. In such an environment, it is only natural that employees would use any opportunity to circumvent IT policies and procedures. If you want to address the problem, address the perception first, particularly the power perception. Start by distinguishing between legitimate security concerns and simple paranoia. Communicate the 'why' to end users of the systems. Then you might start getting buy-in from line-level management and workers.

                                David Veeneman www.veeneman.com

                                1 Reply Last reply
                                0
                                • J JimmyRopes

                                  Ten Things Your IT Department Won't Tell You[^] I find it hard to believe this was in a reputable publication like the Wall Street Journal. :sigh: This is irresponsible. X| It basically tells you how to bypass your company's security procedures. :rolleyes: 1. HOW TO SEND GIANT FILES 2. HOW TO USE SOFTWARE THAT YOUR COMPANY WON'T LET YOU DOWNLOAD 3. HOW TO VISIT THE WEB SITES YOUR COMPANY BLOCKS 4. HOW TO CLEAR YOUR TRACKS ON YOUR WORK LAPTOP 5. HOW TO SEARCH FOR YOUR WORK DOCUMENTS FROM HOME 6. HOW TO STORE WORK FILES ONLINE 7. HOW TO KEEP YOUR PRIVACY WHEN USING WEB EMAIL 8. HOW TO ACCESS YOUR WORK EMAIL REMOTELY WHEN YOUR COMPANY WON'T SPRING FOR A BLACKBERRY 9. HOW TO ACCESS YOUR PERSONAL EMAIL ON YOUR BLACKBERRY 10. HOW TO LOOK LIKE YOU'RE WORKING

                                  Simply Elegant Designs JimmyRopes Designs
                                  Think inside the box! ProActive Secure Systems
                                  I'm on-line therefore I am. JimmyRopes

                                  R Offline
                                  R Offline
                                  robertewilson
                                  wrote on last edited by
                                  #26

                                  Don't blame the WSJ, as sources of the information reported in the article came from -- IT people themselves! Now, IT admins & staff will have to deal with the aftermath.

                                  J 1 Reply Last reply
                                  0
                                  • J JimmyRopes

                                    Ten Things Your IT Department Won't Tell You[^] I find it hard to believe this was in a reputable publication like the Wall Street Journal. :sigh: This is irresponsible. X| It basically tells you how to bypass your company's security procedures. :rolleyes: 1. HOW TO SEND GIANT FILES 2. HOW TO USE SOFTWARE THAT YOUR COMPANY WON'T LET YOU DOWNLOAD 3. HOW TO VISIT THE WEB SITES YOUR COMPANY BLOCKS 4. HOW TO CLEAR YOUR TRACKS ON YOUR WORK LAPTOP 5. HOW TO SEARCH FOR YOUR WORK DOCUMENTS FROM HOME 6. HOW TO STORE WORK FILES ONLINE 7. HOW TO KEEP YOUR PRIVACY WHEN USING WEB EMAIL 8. HOW TO ACCESS YOUR WORK EMAIL REMOTELY WHEN YOUR COMPANY WON'T SPRING FOR A BLACKBERRY 9. HOW TO ACCESS YOUR PERSONAL EMAIL ON YOUR BLACKBERRY 10. HOW TO LOOK LIKE YOU'RE WORKING

                                    Simply Elegant Designs JimmyRopes Designs
                                    Think inside the box! ProActive Secure Systems
                                    I'm on-line therefore I am. JimmyRopes

                                    C Offline
                                    C Offline
                                    Craster
                                    wrote on last edited by
                                    #27

                                    To be honest, all of these are things that the company IT security professionals should already have thought of. Any proxy administrator worth their salt will have already blocked as many upload sites and 3rd party proxies as they can find, and there are companies that do nothing but provide lists of what to block. The one thing that can't really be blocked is someone setting up their own proxy/upload site that won't be known about by published proxy blacklists.

                                    J 1 Reply Last reply
                                    0
                                    • P Paul Watson

                                      I see your company IT policy, which you haven't subverted yet, includes TYPING IN CAPITALS. (You do make a slight point though. Companies need to change but through proper process not through subversion.)

                                      regards, Paul Watson Ireland & South Africa

                                      Shog9 wrote:

                                      And with that, Paul closed his browser, sipped his herbal tea, fixed the flower in his hair, and smiled brightly at the multitude of cute, furry animals flocking around the grassy hillside where he sat coding Ruby on his Mac...

                                      J Offline
                                      J Offline
                                      JimmyRopes
                                      wrote on last edited by
                                      #28

                                      Paul Watson wrote:

                                      TYPING IN CAPITALS

                                      Just swiped the lines from the WSJ article. Didn't type any of them. I don't type in all caps, except when it is syntactically correct to do so as in forming acronyms. By the way, you really didn't need to type "TYPING IN CAPITALS" (swiped that too) when a simple "typing in capitals" would do nicely.

                                      Paul Watson wrote:

                                      Companies need to change but through proper process not through subversion.

                                      Agreed, some companies need to change their IT policy, but what struck me as irresponsible was a trusted business journal advocating policy that will put the person's job in jeopardy. Storing company documents on public repositories, out of the control of the company, is not something a respected business publication should advocate. I think you probably don't appreciate the WSJ reputation in business. It used to be a very responsible publication.

                                      Simply Elegant Designs JimmyRopes Designs
                                      Think inside the box! ProActive Secure Systems
                                      I'm on-line therefore I am. JimmyRopes

                                      M 1 Reply Last reply
                                      0
                                      • R robertewilson

                                        Don't blame the WSJ, as sources of the information reported in the article came from -- IT people themselves! Now, IT admins & staff will have to deal with the aftermath.

                                        J Offline
                                        J Offline
                                        JimmyRopes
                                        wrote on last edited by
                                        #29

                                        robertewilson wrote:

                                        Don't blame the WSJ, as sources of the information reported in the article came from -- IT people themselves!

                                        Then what is the function of the editor if not to edit the content of the newspaper. This article is clearly advocating things that if practiced put someone at risk of losing their job.

                                        Simply Elegant Designs JimmyRopes Designs
                                        Think inside the box! ProActive Secure Systems
                                        I'm on-line therefore I am. JimmyRopes

                                        R 1 Reply Last reply
                                        0
                                        • J JimmyRopes

                                          robertewilson wrote:

                                          Don't blame the WSJ, as sources of the information reported in the article came from -- IT people themselves!

                                          Then what is the function of the editor if not to edit the content of the newspaper. This article is clearly advocating things that if practiced put someone at risk of losing their job.

                                          Simply Elegant Designs JimmyRopes Designs
                                          Think inside the box! ProActive Secure Systems
                                          I'm on-line therefore I am. JimmyRopes

                                          R Offline
                                          R Offline
                                          robertewilson
                                          wrote on last edited by
                                          #30

                                          Jimmy, A cogent debate here. This august publication reports on more than just business matters and I am a subscriber myself to the Online Journal. I was initially surprised by the appearance of the article, but after reading it, it occurred to me that, if there were no willing IT people divulging these open "secrets," there would have been nothing for the reporter to write. I agree with you that perhaps the article was misguided, but these "tips" can be found on hundreds of sites via any major search engine. The means to circumvent corporate policies and procedures is out there and has been for a long time -- but it requires the will to do so.

                                          M 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups