Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. I don't know who I hate more...

I don't know who I hate more...

Scheduled Pinned Locked Moved The Lounge
security
45 Posts 22 Posters 1 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • G Offline
    G Offline
    glennPattonWork3
    wrote on last edited by
    #1

    Hi All, Trying and failing to work from home due in part to the wet string broad band connection and the laptop I have, locked for my security. Having to use a 'Mini Hub' due to the broadband being unstable I find I can't use the mini-hub as the Work lappy will not see things plugged into the usb ports! So I have go to go into the Office to winge at IT and attend an Online meeting. I wanted to work from home today! :sigh:

    S G M W W 5 Replies Last reply
    0
    • G glennPattonWork3

      Hi All, Trying and failing to work from home due in part to the wet string broad band connection and the laptop I have, locked for my security. Having to use a 'Mini Hub' due to the broadband being unstable I find I can't use the mini-hub as the Work lappy will not see things plugged into the usb ports! So I have go to go into the Office to winge at IT and attend an Online meeting. I wanted to work from home today! :sigh:

      S Offline
      S Offline
      Slacker007
      wrote on last edited by
      #2

      glennPattonContracting2 wrote:

      the Work lappy will not see things plugged into the usb ports!

      this is a great security feature as some employees like to steal source code, etc. and put them on thumb drives. My company has the laptop encrypted with Bitlocker and so if you store something on a USB device, it encrypts it, so that only the laptop can read it back again. My company also installed extra security software to prevent uploading anything to non approved repos, etc. so stealing source code, etc. and uploading it to a personal drop box, cloud storage, git repo, etc. can't be done either. My laptop is currently the most secure digital device I have had in my entire life, I think. :laugh:

      enhzflepE L C M O 5 Replies Last reply
      0
      • S Slacker007

        glennPattonContracting2 wrote:

        the Work lappy will not see things plugged into the usb ports!

        this is a great security feature as some employees like to steal source code, etc. and put them on thumb drives. My company has the laptop encrypted with Bitlocker and so if you store something on a USB device, it encrypts it, so that only the laptop can read it back again. My company also installed extra security software to prevent uploading anything to non approved repos, etc. so stealing source code, etc. and uploading it to a personal drop box, cloud storage, git repo, etc. can't be done either. My laptop is currently the most secure digital device I have had in my entire life, I think. :laugh:

        enhzflepE Offline
        enhzflepE Offline
        enhzflep
        wrote on last edited by
        #3

        No camera phones either? OCR on phone photos is entirely trivial. Even better - thanks to Samsung's Fort Knox (I'm sure competitors have similar) you can put those photos into secure storage where the outside world don't shine and be done with it... :-\ :laugh:

        D 1 Reply Last reply
        0
        • enhzflepE enhzflep

          No camera phones either? OCR on phone photos is entirely trivial. Even better - thanks to Samsung's Fort Knox (I'm sure competitors have similar) you can put those photos into secure storage where the outside world don't shine and be done with it... :-\ :laugh:

          D Offline
          D Offline
          den2k88
          wrote on last edited by
          #4

          As any protection measure, it raises the required skill level and the cost of breaching them. It can't completely prevent intrusion by a skilled and motivated attacker.

          GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++*      Weapons extension: ma- k++ F+2 X

          enhzflepE 1 Reply Last reply
          0
          • S Slacker007

            glennPattonContracting2 wrote:

            the Work lappy will not see things plugged into the usb ports!

            this is a great security feature as some employees like to steal source code, etc. and put them on thumb drives. My company has the laptop encrypted with Bitlocker and so if you store something on a USB device, it encrypts it, so that only the laptop can read it back again. My company also installed extra security software to prevent uploading anything to non approved repos, etc. so stealing source code, etc. and uploading it to a personal drop box, cloud storage, git repo, etc. can't be done either. My laptop is currently the most secure digital device I have had in my entire life, I think. :laugh:

            L Offline
            L Offline
            Lost User
            wrote on last edited by
            #5

            Slacker007 wrote:

            My laptop is currently the most secure digital device I have had in my entire life, I think. :laugh:

            Exporting text is usually trivial. Moreso if a compiler is on the machine. If you need to neuter the machine because you cannot trust your employees means you have a bigger problem :)

            Bastard Programmer from Hell :suss: "If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.

            D C 2 Replies Last reply
            0
            • L Lost User

              Slacker007 wrote:

              My laptop is currently the most secure digital device I have had in my entire life, I think. :laugh:

              Exporting text is usually trivial. Moreso if a compiler is on the machine. If you need to neuter the machine because you cannot trust your employees means you have a bigger problem :)

              Bastard Programmer from Hell :suss: "If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.

              D Offline
              D Offline
              den2k88
              wrote on last edited by
              #6

              Eddy Vluggen wrote:

              If you need to neuter the machine because you cannot trust your employees means you have a bigger problem

              Or more than one. There are many "engineers" and "developers" who blindly click and fall for any phishing scam they see, or use their work computers for personal and potentially risky activities (gaming, sketchy p**n sites, sketchy "dating" sites, P2P, streaming...).

              GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++*      Weapons extension: ma- k++ F+2 X

              T L 2 Replies Last reply
              0
              • D den2k88

                As any protection measure, it raises the required skill level and the cost of breaching them. It can't completely prevent intrusion by a skilled and motivated attacker.

                GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++*      Weapons extension: ma- k++ F+2 X

                enhzflepE Offline
                enhzflepE Offline
                enhzflep
                wrote on last edited by
                #7

                Sure, I get that. The old saying, you can't prevent access, merely increase its cost has never been more true. What is also true however, is that if you flaunt your distrust for those you rely upon, you're simply scheduling the time they'll bite you when they can. People that need said measures in order not to steal the company data weren't the best hires in the first place. Oh. Right. Recruitment firms and HR. Nevermind. I'm thinking about some alternate universe where these entities aren't dumber than a firehose. :doh:

                D P 2 Replies Last reply
                0
                • enhzflepE enhzflep

                  Sure, I get that. The old saying, you can't prevent access, merely increase its cost has never been more true. What is also true however, is that if you flaunt your distrust for those you rely upon, you're simply scheduling the time they'll bite you when they can. People that need said measures in order not to steal the company data weren't the best hires in the first place. Oh. Right. Recruitment firms and HR. Nevermind. I'm thinking about some alternate universe where these entities aren't dumber than a firehose. :doh:

                  D Offline
                  D Offline
                  den2k88
                  wrote on last edited by
                  #8

                  And consultants. Too many firms hire consultants as temporary workers, and consulence companies foster a mercenary environment - they parade us to customers singing our praises and overselling us , just like a pimp would do - so trust is hard to give.

                  GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++*      Weapons extension: ma- k++ F+2 X

                  D 1 Reply Last reply
                  0
                  • D den2k88

                    Eddy Vluggen wrote:

                    If you need to neuter the machine because you cannot trust your employees means you have a bigger problem

                    Or more than one. There are many "engineers" and "developers" who blindly click and fall for any phishing scam they see, or use their work computers for personal and potentially risky activities (gaming, sketchy p**n sites, sketchy "dating" sites, P2P, streaming...).

                    GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++*      Weapons extension: ma- k++ F+2 X

                    T Offline
                    T Offline
                    theoldfool
                    wrote on last edited by
                    #9

                    Quote:

                    use their work computers for personal and potentially risky activities

                    Therein lies a problem, more so if you can't block stuff like yahoo mail. We do so at the firewall but that is only on site. A "well protected" corp laptop: Highly interlocked, protected device, with limited compute capabilities. :sigh:

                    If you can keep your head while those about you are losing theirs, perhaps you don't understand the situation.

                    D 1 Reply Last reply
                    0
                    • T theoldfool

                      Quote:

                      use their work computers for personal and potentially risky activities

                      Therein lies a problem, more so if you can't block stuff like yahoo mail. We do so at the firewall but that is only on site. A "well protected" corp laptop: Highly interlocked, protected device, with limited compute capabilities. :sigh:

                      If you can keep your head while those about you are losing theirs, perhaps you don't understand the situation.

                      D Offline
                      D Offline
                      den2k88
                      wrote on last edited by
                      #10

                      It's honestly a question of employee training and selection. If an employee has not the honesty, intelligence and integrity necessary to not f* around with company's equipment he has to go. When unapologetically laying off any employee stupid enough to not grasp the basic computer security concepts after 40 years of PC existance becomes the norm, computer security becomes the norm as well. Dura lex, sed lex.

                      GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++*      Weapons extension: ma- k++ F+2 X

                      T Greg UtasG P 3 Replies Last reply
                      0
                      • D den2k88

                        It's honestly a question of employee training and selection. If an employee has not the honesty, intelligence and integrity necessary to not f* around with company's equipment he has to go. When unapologetically laying off any employee stupid enough to not grasp the basic computer security concepts after 40 years of PC existance becomes the norm, computer security becomes the norm as well. Dura lex, sed lex.

                        GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++*      Weapons extension: ma- k++ F+2 X

                        T Offline
                        T Offline
                        theoldfool
                        wrote on last edited by
                        #11

                        I love your perfect world. :) Alas, mine has a few very smart people who occasionally make dumb mistakes.

                        If you can keep your head while those about you are losing theirs, perhaps you don't understand the situation.

                        D J 2 Replies Last reply
                        0
                        • D den2k88

                          It's honestly a question of employee training and selection. If an employee has not the honesty, intelligence and integrity necessary to not f* around with company's equipment he has to go. When unapologetically laying off any employee stupid enough to not grasp the basic computer security concepts after 40 years of PC existance becomes the norm, computer security becomes the norm as well. Dura lex, sed lex.

                          GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++*      Weapons extension: ma- k++ F+2 X

                          Greg UtasG Offline
                          Greg UtasG Offline
                          Greg Utas
                          wrote on last edited by
                          #12

                          Quote:

                          Dura lex, sed lex

                          Maybe that's where Monty Python got "Cruel, but fair." :laugh:

                          Robust Services Core | Software Techniques for Lemmings | Articles
                          The fox knows many things, but the hedgehog knows one big thing.

                          <p><a href="https://github.com/GregUtas/robust-services-core/blob/master/README.md">Robust Services Core</a>
                          <em>The fox knows many things, but the hedgehog knows one big thing.</em></p>

                          D 1 Reply Last reply
                          0
                          • D den2k88

                            Eddy Vluggen wrote:

                            If you need to neuter the machine because you cannot trust your employees means you have a bigger problem

                            Or more than one. There are many "engineers" and "developers" who blindly click and fall for any phishing scam they see, or use their work computers for personal and potentially risky activities (gaming, sketchy p**n sites, sketchy "dating" sites, P2P, streaming...).

                            GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++*      Weapons extension: ma- k++ F+2 X

                            L Offline
                            L Offline
                            Lost User
                            wrote on last edited by
                            #13

                            It was mainly the managers who were the culprits where I last worked. Could not believe how stupid a couple of them were.

                            1 Reply Last reply
                            0
                            • L Lost User

                              Slacker007 wrote:

                              My laptop is currently the most secure digital device I have had in my entire life, I think. :laugh:

                              Exporting text is usually trivial. Moreso if a compiler is on the machine. If you need to neuter the machine because you cannot trust your employees means you have a bigger problem :)

                              Bastard Programmer from Hell :suss: "If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.

                              C Offline
                              C Offline
                              CPallini
                              wrote on last edited by
                              #14

                              Indeed.

                              "In testa che avete, Signor di Ceprano?" -- Rigoletto

                              1 Reply Last reply
                              0
                              • T theoldfool

                                I love your perfect world. :) Alas, mine has a few very smart people who occasionally make dumb mistakes.

                                If you can keep your head while those about you are losing theirs, perhaps you don't understand the situation.

                                D Offline
                                D Offline
                                den2k88
                                wrote on last edited by
                                #15

                                Occasional dumb mistakes are one thing, many people though cultivate a path of willfull ignorance and criminal negligence.

                                GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++*      Weapons extension: ma- k++ F+2 X

                                T J 2 Replies Last reply
                                0
                                • S Slacker007

                                  glennPattonContracting2 wrote:

                                  the Work lappy will not see things plugged into the usb ports!

                                  this is a great security feature as some employees like to steal source code, etc. and put them on thumb drives. My company has the laptop encrypted with Bitlocker and so if you store something on a USB device, it encrypts it, so that only the laptop can read it back again. My company also installed extra security software to prevent uploading anything to non approved repos, etc. so stealing source code, etc. and uploading it to a personal drop box, cloud storage, git repo, etc. can't be done either. My laptop is currently the most secure digital device I have had in my entire life, I think. :laugh:

                                  C Offline
                                  C Offline
                                  Chris C B
                                  wrote on last edited by
                                  #16

                                  Now is a good time to remind you of one Wolfgang Amadeus Mozart and Allegri’s “Miserere mei Deus”, which the Vatican absolutely forbid to be copied, and prelates looked out for anyone who might be doing just that while it was being sung. However, the teenage Mozart went to the Tenebrae and listened. That night at home he wrote out the whole thing. note perfect, in full, all parts, in all its contrapuntal glory. So, if you code to 'Mozart' standards ... :~ :-\

                                  1 Reply Last reply
                                  0
                                  • Greg UtasG Greg Utas

                                    Quote:

                                    Dura lex, sed lex

                                    Maybe that's where Monty Python got "Cruel, but fair." :laugh:

                                    Robust Services Core | Software Techniques for Lemmings | Articles
                                    The fox knows many things, but the hedgehog knows one big thing.

                                    D Offline
                                    D Offline
                                    den2k88
                                    wrote on last edited by
                                    #17

                                    Well, John Cleese was a latin teacher...

                                    GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++*      Weapons extension: ma- k++ F+2 X

                                    Greg UtasG 1 Reply Last reply
                                    0
                                    • D den2k88

                                      Well, John Cleese was a latin teacher...

                                      GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++*      Weapons extension: ma- k++ F+2 X

                                      Greg UtasG Offline
                                      Greg UtasG Offline
                                      Greg Utas
                                      wrote on last edited by
                                      #18

                                      Makes sense!

                                      Robust Services Core | Software Techniques for Lemmings | Articles
                                      The fox knows many things, but the hedgehog knows one big thing.

                                      <p><a href="https://github.com/GregUtas/robust-services-core/blob/master/README.md">Robust Services Core</a>
                                      <em>The fox knows many things, but the hedgehog knows one big thing.</em></p>

                                      1 Reply Last reply
                                      0
                                      • T theoldfool

                                        I love your perfect world. :) Alas, mine has a few very smart people who occasionally make dumb mistakes.

                                        If you can keep your head while those about you are losing theirs, perhaps you don't understand the situation.

                                        J Offline
                                        J Offline
                                        Jorgen Andersson
                                        wrote on last edited by
                                        #19

                                        Also known as the Inverse Stopped Clock

                                        Wrong is evil and must be defeated. - Jeff Ello

                                        1 Reply Last reply
                                        0
                                        • D den2k88

                                          Occasional dumb mistakes are one thing, many people though cultivate a path of willfull ignorance and criminal negligence.

                                          GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++*      Weapons extension: ma- k++ F+2 X

                                          T Offline
                                          T Offline
                                          theoldfool
                                          wrote on last edited by
                                          #20

                                          Here, we refer to them as politicians. :laugh:

                                          If you can keep your head while those about you are losing theirs, perhaps you don't understand the situation.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups