Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. I don't know who I hate more...

I don't know who I hate more...

Scheduled Pinned Locked Moved The Lounge
security
45 Posts 22 Posters 1 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • D den2k88

    It's honestly a question of employee training and selection. If an employee has not the honesty, intelligence and integrity necessary to not f* around with company's equipment he has to go. When unapologetically laying off any employee stupid enough to not grasp the basic computer security concepts after 40 years of PC existance becomes the norm, computer security becomes the norm as well. Dura lex, sed lex.

    GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++*      Weapons extension: ma- k++ F+2 X

    T Offline
    T Offline
    theoldfool
    wrote on last edited by
    #11

    I love your perfect world. :) Alas, mine has a few very smart people who occasionally make dumb mistakes.

    If you can keep your head while those about you are losing theirs, perhaps you don't understand the situation.

    D J 2 Replies Last reply
    0
    • D den2k88

      It's honestly a question of employee training and selection. If an employee has not the honesty, intelligence and integrity necessary to not f* around with company's equipment he has to go. When unapologetically laying off any employee stupid enough to not grasp the basic computer security concepts after 40 years of PC existance becomes the norm, computer security becomes the norm as well. Dura lex, sed lex.

      GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++*      Weapons extension: ma- k++ F+2 X

      Greg UtasG Offline
      Greg UtasG Offline
      Greg Utas
      wrote on last edited by
      #12

      Quote:

      Dura lex, sed lex

      Maybe that's where Monty Python got "Cruel, but fair." :laugh:

      Robust Services Core | Software Techniques for Lemmings | Articles
      The fox knows many things, but the hedgehog knows one big thing.

      <p><a href="https://github.com/GregUtas/robust-services-core/blob/master/README.md">Robust Services Core</a>
      <em>The fox knows many things, but the hedgehog knows one big thing.</em></p>

      D 1 Reply Last reply
      0
      • D den2k88

        Eddy Vluggen wrote:

        If you need to neuter the machine because you cannot trust your employees means you have a bigger problem

        Or more than one. There are many "engineers" and "developers" who blindly click and fall for any phishing scam they see, or use their work computers for personal and potentially risky activities (gaming, sketchy p**n sites, sketchy "dating" sites, P2P, streaming...).

        GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++*      Weapons extension: ma- k++ F+2 X

        L Offline
        L Offline
        Lost User
        wrote on last edited by
        #13

        It was mainly the managers who were the culprits where I last worked. Could not believe how stupid a couple of them were.

        1 Reply Last reply
        0
        • L Lost User

          Slacker007 wrote:

          My laptop is currently the most secure digital device I have had in my entire life, I think. :laugh:

          Exporting text is usually trivial. Moreso if a compiler is on the machine. If you need to neuter the machine because you cannot trust your employees means you have a bigger problem :)

          Bastard Programmer from Hell :suss: "If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.

          C Offline
          C Offline
          CPallini
          wrote on last edited by
          #14

          Indeed.

          "In testa che avete, Signor di Ceprano?" -- Rigoletto

          1 Reply Last reply
          0
          • T theoldfool

            I love your perfect world. :) Alas, mine has a few very smart people who occasionally make dumb mistakes.

            If you can keep your head while those about you are losing theirs, perhaps you don't understand the situation.

            D Offline
            D Offline
            den2k88
            wrote on last edited by
            #15

            Occasional dumb mistakes are one thing, many people though cultivate a path of willfull ignorance and criminal negligence.

            GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++*      Weapons extension: ma- k++ F+2 X

            T J 2 Replies Last reply
            0
            • S Slacker007

              glennPattonContracting2 wrote:

              the Work lappy will not see things plugged into the usb ports!

              this is a great security feature as some employees like to steal source code, etc. and put them on thumb drives. My company has the laptop encrypted with Bitlocker and so if you store something on a USB device, it encrypts it, so that only the laptop can read it back again. My company also installed extra security software to prevent uploading anything to non approved repos, etc. so stealing source code, etc. and uploading it to a personal drop box, cloud storage, git repo, etc. can't be done either. My laptop is currently the most secure digital device I have had in my entire life, I think. :laugh:

              C Offline
              C Offline
              Chris C B
              wrote on last edited by
              #16

              Now is a good time to remind you of one Wolfgang Amadeus Mozart and Allegri’s “Miserere mei Deus”, which the Vatican absolutely forbid to be copied, and prelates looked out for anyone who might be doing just that while it was being sung. However, the teenage Mozart went to the Tenebrae and listened. That night at home he wrote out the whole thing. note perfect, in full, all parts, in all its contrapuntal glory. So, if you code to 'Mozart' standards ... :~ :-\

              1 Reply Last reply
              0
              • Greg UtasG Greg Utas

                Quote:

                Dura lex, sed lex

                Maybe that's where Monty Python got "Cruel, but fair." :laugh:

                Robust Services Core | Software Techniques for Lemmings | Articles
                The fox knows many things, but the hedgehog knows one big thing.

                D Offline
                D Offline
                den2k88
                wrote on last edited by
                #17

                Well, John Cleese was a latin teacher...

                GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++*      Weapons extension: ma- k++ F+2 X

                Greg UtasG 1 Reply Last reply
                0
                • D den2k88

                  Well, John Cleese was a latin teacher...

                  GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++*      Weapons extension: ma- k++ F+2 X

                  Greg UtasG Offline
                  Greg UtasG Offline
                  Greg Utas
                  wrote on last edited by
                  #18

                  Makes sense!

                  Robust Services Core | Software Techniques for Lemmings | Articles
                  The fox knows many things, but the hedgehog knows one big thing.

                  <p><a href="https://github.com/GregUtas/robust-services-core/blob/master/README.md">Robust Services Core</a>
                  <em>The fox knows many things, but the hedgehog knows one big thing.</em></p>

                  1 Reply Last reply
                  0
                  • T theoldfool

                    I love your perfect world. :) Alas, mine has a few very smart people who occasionally make dumb mistakes.

                    If you can keep your head while those about you are losing theirs, perhaps you don't understand the situation.

                    J Offline
                    J Offline
                    Jorgen Andersson
                    wrote on last edited by
                    #19

                    Also known as the Inverse Stopped Clock

                    Wrong is evil and must be defeated. - Jeff Ello

                    1 Reply Last reply
                    0
                    • D den2k88

                      Occasional dumb mistakes are one thing, many people though cultivate a path of willfull ignorance and criminal negligence.

                      GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++*      Weapons extension: ma- k++ F+2 X

                      T Offline
                      T Offline
                      theoldfool
                      wrote on last edited by
                      #20

                      Here, we refer to them as politicians. :laugh:

                      If you can keep your head while those about you are losing theirs, perhaps you don't understand the situation.

                      1 Reply Last reply
                      0
                      • G glennPattonWork3

                        Hi All, Trying and failing to work from home due in part to the wet string broad band connection and the laptop I have, locked for my security. Having to use a 'Mini Hub' due to the broadband being unstable I find I can't use the mini-hub as the Work lappy will not see things plugged into the usb ports! So I have go to go into the Office to winge at IT and attend an Online meeting. I wanted to work from home today! :sigh:

                        G Offline
                        G Offline
                        Gary R Wheeler
                        wrote on last edited by
                        #21

                        glennPattonContracting2 wrote:

                        I can't use the mini-hub as the Work lappy will not see things plugged into the usb ports!

                        We have the McAfee virus at work. Its primary faults are two-fold. First, every time you plug a removable device it that isn't encrypted, it offers to do so. You can say no, but it's not the default choice. The encryption typically bricks the device. The other is in insane. Any application that writes executable files is subject to their "Adaptive Threat Protection". This is a heuristic mechanism that locks the file being written and then scans it for malware. Unfortunately, if the original writing process closes the file and then re-opens it, it's now broken. Visual Studio's manifest embedding and Inno Setup get caught in this a lot. I've had stern words with our IT department over the whole thing, with less than pleasant results.

                        Software Zen: delete this;

                        G 1 Reply Last reply
                        0
                        • G Gary R Wheeler

                          glennPattonContracting2 wrote:

                          I can't use the mini-hub as the Work lappy will not see things plugged into the usb ports!

                          We have the McAfee virus at work. Its primary faults are two-fold. First, every time you plug a removable device it that isn't encrypted, it offers to do so. You can say no, but it's not the default choice. The encryption typically bricks the device. The other is in insane. Any application that writes executable files is subject to their "Adaptive Threat Protection". This is a heuristic mechanism that locks the file being written and then scans it for malware. Unfortunately, if the original writing process closes the file and then re-opens it, it's now broken. Visual Studio's manifest embedding and Inno Setup get caught in this a lot. I've had stern words with our IT department over the whole thing, with less than pleasant results.

                          Software Zen: delete this;

                          G Offline
                          G Offline
                          glennPattonWork3
                          wrote on last edited by
                          #22

                          McAfee?, I went in now it appears to be working apart from I log into the VPN, but I have to go in tomorrow to run some tests (if the hardware is ready..!). I've only had the weirdness with it (McAfee) not running the VPN software, being updated runs fine, McAfee won't run the VPN. I thank :bob: I haven't had to Vis Studio yet...

                          G 1 Reply Last reply
                          0
                          • D den2k88

                            It's honestly a question of employee training and selection. If an employee has not the honesty, intelligence and integrity necessary to not f* around with company's equipment he has to go. When unapologetically laying off any employee stupid enough to not grasp the basic computer security concepts after 40 years of PC existance becomes the norm, computer security becomes the norm as well. Dura lex, sed lex.

                            GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++*      Weapons extension: ma- k++ F+2 X

                            P Offline
                            P Offline
                            pmauriks
                            wrote on last edited by
                            #23

                            What you are missing is that some of these people were hired for things other than their computer skills. That guy who is dumber than a firehose around IT may be the companies best lawyer. The IT systems are (unfortunately) configured for the average person - not developers. Unfortunately IT might not have enough resources to solve more than the average - and developers get caught up in it. . . and to be fair - I've seen my fair share of developers doing pretty stupid things as well. Agree you need to trust people to drive safely - but enforcing seat belts is not such a bad thing. You might even find yourself thanking the seatbelts at some point when you had an "In a hurry, not thinking, just send this file, brain fade." On the other side of the fence - provided you are not a cowboy - most IT staff (given the time) would be happy to set you up better. Speak with them - they should be your friends - not your enemies. Most of the time they can come up with something.

                            1 Reply Last reply
                            0
                            • G glennPattonWork3

                              Hi All, Trying and failing to work from home due in part to the wet string broad band connection and the laptop I have, locked for my security. Having to use a 'Mini Hub' due to the broadband being unstable I find I can't use the mini-hub as the Work lappy will not see things plugged into the usb ports! So I have go to go into the Office to winge at IT and attend an Online meeting. I wanted to work from home today! :sigh:

                              M Offline
                              M Offline
                              Member 9167057
                              wrote on last edited by
                              #24

                              If it was just Home Office which suffers from paranoid IT. I had several cases of my work code being marked as malware by some paranoia "solution" (which does exactly as much against malware as Defender does, except with more false positives). I had an API, which according to Microsoft documentation, works just fine, only work when started as administrator. I once had the whole of our worldwide IT chiefs meet at the head quarters just because I've used robocopy (which is such an evil and forbidden tool, the IT didn't even bother lock it with group policy because hey, since when do IT chiefs need to know what's available on a stock Windows machine).

                              1 Reply Last reply
                              0
                              • G glennPattonWork3

                                Hi All, Trying and failing to work from home due in part to the wet string broad band connection and the laptop I have, locked for my security. Having to use a 'Mini Hub' due to the broadband being unstable I find I can't use the mini-hub as the Work lappy will not see things plugged into the usb ports! So I have go to go into the Office to winge at IT and attend an Online meeting. I wanted to work from home today! :sigh:

                                W Offline
                                W Offline
                                Wizard of Sleeves
                                wrote on last edited by
                                #25

                                "Keys don't lock doors, they only lock locks" - me. I hate it when they give me a new laptop that is locked down. I do like getting a new laptop. What I don't like is the time I waste figuring out how to get it back to a state that serves my needs; so that I can do what I am paid to do.

                                Nothing succeeds like a budgie without teeth.

                                G 1 Reply Last reply
                                0
                                • S Slacker007

                                  glennPattonContracting2 wrote:

                                  the Work lappy will not see things plugged into the usb ports!

                                  this is a great security feature as some employees like to steal source code, etc. and put them on thumb drives. My company has the laptop encrypted with Bitlocker and so if you store something on a USB device, it encrypts it, so that only the laptop can read it back again. My company also installed extra security software to prevent uploading anything to non approved repos, etc. so stealing source code, etc. and uploading it to a personal drop box, cloud storage, git repo, etc. can't be done either. My laptop is currently the most secure digital device I have had in my entire life, I think. :laugh:

                                  M Offline
                                  M Offline
                                  MadGerbil
                                  wrote on last edited by
                                  #26

                                  So you cannot export the repo, zip it, and mail it?

                                  S 1 Reply Last reply
                                  0
                                  • M MadGerbil

                                    So you cannot export the repo, zip it, and mail it?

                                    S Offline
                                    S Offline
                                    Slacker007
                                    wrote on last edited by
                                    #27

                                    all email is scanned, I know that. I have not tried to test their scanning abilities for zip files, etc. or encrypted emails. may raise suspicions with security. not sure. don't want to find out.

                                    enhzflepE 1 Reply Last reply
                                    0
                                    • D den2k88

                                      And consultants. Too many firms hire consultants as temporary workers, and consulence companies foster a mercenary environment - they parade us to customers singing our praises and overselling us , just like a pimp would do - so trust is hard to give.

                                      GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++*      Weapons extension: ma- k++ F+2 X

                                      D Offline
                                      D Offline
                                      DoomsdayTalon
                                      wrote on last edited by
                                      #28

                                      Yeah nothing I hate more than uppers who barely know technology trusting people outside more than inside to make up for their deficiencies. And then implementing the practice when it is convenient to them not the rest of the workforce. Ever wonder why they cause the breach and programmers and IT folk get the claim. Mainly because they are given to much power in the workforce. I honestly can't wait till AI knocks out some of the random things people justify to keep themselves from having to learn on a daily basis. That magic excel sheet I want to blow up everyday and they feel the threat so they try to keep us oppressed in the workforce. A building pipe bursts "Ohh, that was just the weather we can deal with it". My email went down "Find the IT person and skewer them" for a cloud problem that is most of the time on a vendor a consultant recommended for hype. I don't feel business people really understand how to connect the dots and I hate the don't care make it work mentality.:mad::mad::mad: :((

                                      1 Reply Last reply
                                      0
                                      • S Slacker007

                                        glennPattonContracting2 wrote:

                                        the Work lappy will not see things plugged into the usb ports!

                                        this is a great security feature as some employees like to steal source code, etc. and put them on thumb drives. My company has the laptop encrypted with Bitlocker and so if you store something on a USB device, it encrypts it, so that only the laptop can read it back again. My company also installed extra security software to prevent uploading anything to non approved repos, etc. so stealing source code, etc. and uploading it to a personal drop box, cloud storage, git repo, etc. can't be done either. My laptop is currently the most secure digital device I have had in my entire life, I think. :laugh:

                                        O Offline
                                        O Offline
                                        obermd
                                        wrote on last edited by
                                        #29

                                        Slacker007 wrote:

                                        My company has the laptop encrypted with Bitlocker and so if you store something on a USB device, it encrypts it, so that only the laptop can read it back again.

                                        Any machine running BitLocker can unlock those USB drives. You just need to know the password or recovery key.

                                        G S 2 Replies Last reply
                                        0
                                        • O obermd

                                          Slacker007 wrote:

                                          My company has the laptop encrypted with Bitlocker and so if you store something on a USB device, it encrypts it, so that only the laptop can read it back again.

                                          Any machine running BitLocker can unlock those USB drives. You just need to know the password or recovery key.

                                          G Offline
                                          G Offline
                                          glennPattonWork3
                                          wrote on last edited by
                                          #30

                                          Not when you are trying to recover a system in front of a customer. Recovery keys are a joke lets, make it so long you have no chance of rembering it, thank :bob: for masking tape and a pen, so you can write on the blooming stick

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups