Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. CDOTD

CDOTD

Scheduled Pinned Locked Moved The Lounge
comworkspace
31 Posts 11 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • G Offline
    G Offline
    Gary Wheeler
    wrote on last edited by
    #1

    We use Inno Setup[^] for all of our installers, and have for years. I estimate we have over a man-year of work in installers for our products, optional features, etc. Yesterday I discovered that the innosetup.com site is now blocked by our IS department, which uses McAfee Web Gateway to manage 'prohibited' sites. Today I received an email from one of the IS yabbos to the effect that Inno Setup was not on the approved list of applications. I was told to apply for approval, and then they would consider beginning the exception process for the web site. What. The. Fuck. My plans are to be the good little corporate drone and fill out whatever numb-nuts crap they ask, and then go right the fuck ahead and continue to use Inno Setup. It works, it's easy to use, it's for crap's sake FREE. To paraphrase JSOP, they'll take my Inno Setup when they claw it from my cold, dead hard drive. (*) Corporate Douche-baggery Of The Day

    Software Zen: delete this;

    J OriginalGriffO N J P 6 Replies Last reply
    0
    • G Gary Wheeler

      We use Inno Setup[^] for all of our installers, and have for years. I estimate we have over a man-year of work in installers for our products, optional features, etc. Yesterday I discovered that the innosetup.com site is now blocked by our IS department, which uses McAfee Web Gateway to manage 'prohibited' sites. Today I received an email from one of the IS yabbos to the effect that Inno Setup was not on the approved list of applications. I was told to apply for approval, and then they would consider beginning the exception process for the web site. What. The. Fuck. My plans are to be the good little corporate drone and fill out whatever numb-nuts crap they ask, and then go right the fuck ahead and continue to use Inno Setup. It works, it's easy to use, it's for crap's sake FREE. To paraphrase JSOP, they'll take my Inno Setup when they claw it from my cold, dead hard drive. (*) Corporate Douche-baggery Of The Day

      Software Zen: delete this;

      J Offline
      J Offline
      Jochen Arndt
      wrote on last edited by
      #2

      If I would have to set a list of approved / allowed applications, InnoSetup would be rated much higher than any McAfee product. In fact, the latter would be only on the list when I'm requested to put it there.

      OriginalGriffO G 2 Replies Last reply
      0
      • G Gary Wheeler

        We use Inno Setup[^] for all of our installers, and have for years. I estimate we have over a man-year of work in installers for our products, optional features, etc. Yesterday I discovered that the innosetup.com site is now blocked by our IS department, which uses McAfee Web Gateway to manage 'prohibited' sites. Today I received an email from one of the IS yabbos to the effect that Inno Setup was not on the approved list of applications. I was told to apply for approval, and then they would consider beginning the exception process for the web site. What. The. Fuck. My plans are to be the good little corporate drone and fill out whatever numb-nuts crap they ask, and then go right the fuck ahead and continue to use Inno Setup. It works, it's easy to use, it's for crap's sake FREE. To paraphrase JSOP, they'll take my Inno Setup when they claw it from my cold, dead hard drive. (*) Corporate Douche-baggery Of The Day

        Software Zen: delete this;

        OriginalGriffO Offline
        OriginalGriffO Offline
        OriginalGriff
        wrote on last edited by
        #3

        Talk to your manager - corporate rules don't have to make sense, but you flaunt them at your own risk. Many companies will start disciplinary processes for using "unapproved" sites and / or apps on company equipment. Just sayin', is all.

        Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...

        "I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
        "Common sense is so rare these days, it should be classified as a super power" - Random T-shirt

        G M 2 Replies Last reply
        0
        • J Jochen Arndt

          If I would have to set a list of approved / allowed applications, InnoSetup would be rated much higher than any McAfee product. In fact, the latter would be only on the list when I'm requested to put it there.

          OriginalGriffO Offline
          OriginalGriffO Offline
          OriginalGriff
          wrote on last edited by
          #4

          Jochen Arndt wrote:

          In fact, the latter would be only on the list when I'm requested forced at gunpoint to put it there.

          Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...

          "I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
          "Common sense is so rare these days, it should be classified as a super power" - Random T-shirt

          J 1 Reply Last reply
          0
          • J Jochen Arndt

            If I would have to set a list of approved / allowed applications, InnoSetup would be rated much higher than any McAfee product. In fact, the latter would be only on the list when I'm requested to put it there.

            G Offline
            G Offline
            Gary Wheeler
            wrote on last edited by
            #5

            McAfee molests Collies[^]. I can't believe some of the crap they convince corporate IT departments to buy. For example, our hard drives are encrypted using a McAfee product. Guess what happens if you have a motherboard fail, and you need to retrieve the data from the hard drive. You can't decrypt it. The data is completely unrecoverable.

            Software Zen: delete this;

            OriginalGriffO M N U 4 Replies Last reply
            0
            • OriginalGriffO OriginalGriff

              Talk to your manager - corporate rules don't have to make sense, but you flaunt them at your own risk. Many companies will start disciplinary processes for using "unapproved" sites and / or apps on company equipment. Just sayin', is all.

              Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...

              G Offline
              G Offline
              Gary Wheeler
              wrote on last edited by
              #6

              I will if this goes any further. This just pisses me off.

              Software Zen: delete this;

              OriginalGriffO 1 Reply Last reply
              0
              • G Gary Wheeler

                I will if this goes any further. This just pisses me off.

                Software Zen: delete this;

                OriginalGriffO Offline
                OriginalGriffO Offline
                OriginalGriff
                wrote on last edited by
                #7

                Take it to your manager and let him take it further: then you can at least blame him if it all goes pear shaped! :laugh:

                Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...

                "I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
                "Common sense is so rare these days, it should be classified as a super power" - Random T-shirt

                G 1 Reply Last reply
                0
                • G Gary Wheeler

                  McAfee molests Collies[^]. I can't believe some of the crap they convince corporate IT departments to buy. For example, our hard drives are encrypted using a McAfee product. Guess what happens if you have a motherboard fail, and you need to retrieve the data from the hard drive. You can't decrypt it. The data is completely unrecoverable.

                  Software Zen: delete this;

                  OriginalGriffO Offline
                  OriginalGriffO Offline
                  OriginalGriff
                  wrote on last edited by
                  #8

                  So ... ransomware then? :laugh:

                  Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...

                  "I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
                  "Common sense is so rare these days, it should be classified as a super power" - Random T-shirt

                  G 1 Reply Last reply
                  0
                  • OriginalGriffO OriginalGriff

                    Take it to your manager and let him take it further: then you can at least blame him if it all goes pear shaped! :laugh:

                    Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...

                    G Offline
                    G Offline
                    Gary Wheeler
                    wrote on last edited by
                    #9

                    Given how pear-shaped things already are in this place, I don't think anybody would notice. Grumble, grumble...

                    Software Zen: delete this;

                    1 Reply Last reply
                    0
                    • OriginalGriffO OriginalGriff

                      Jochen Arndt wrote:

                      In fact, the latter would be only on the list when I'm requested forced at gunpoint to put it there.

                      Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...

                      J Offline
                      J Offline
                      Jochen Arndt
                      wrote on last edited by
                      #10

                      I was going to write that we don't have any guns here at work. But then I remembered that there is a compressed air powered nail gun somewhere in the work shop.

                      N 1 Reply Last reply
                      0
                      • OriginalGriffO OriginalGriff

                        So ... ransomware then? :laugh:

                        Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...

                        G Offline
                        G Offline
                        Gary Wheeler
                        wrote on last edited by
                        #11

                        Hmm. I never made that connection before. (thinks quietly; just ignore the sound of gear teeth breaking off) Nah. I don't think McAfee is competent to pull off any kind of extortion scheme. Besides, my wife and I are big fans of the old Perry Mason TV series[^], so I've learned how to counter every blackmail scheme known to man.

                        Software Zen: delete this;

                        OriginalGriffO 1 Reply Last reply
                        0
                        • G Gary Wheeler

                          McAfee molests Collies[^]. I can't believe some of the crap they convince corporate IT departments to buy. For example, our hard drives are encrypted using a McAfee product. Guess what happens if you have a motherboard fail, and you need to retrieve the data from the hard drive. You can't decrypt it. The data is completely unrecoverable.

                          Software Zen: delete this;

                          M Offline
                          M Offline
                          Midi_Mick
                          wrote on last edited by
                          #12

                          Gary Wheeler wrote:

                          I can't believe some of the crap they convince corporate IT departments to buy

                          How do you think Microsoft did so well? The office suite is some of the worst written software I have ever encountered, and yet.....

                          Cheers, Mick ------------------------------------------------ It doesn't matter how often or hard you fall on your arse, eventually you'll roll over and land on your feet.

                          1 Reply Last reply
                          0
                          • G Gary Wheeler

                            McAfee molests Collies[^]. I can't believe some of the crap they convince corporate IT departments to buy. For example, our hard drives are encrypted using a McAfee product. Guess what happens if you have a motherboard fail, and you need to retrieve the data from the hard drive. You can't decrypt it. The data is completely unrecoverable.

                            Software Zen: delete this;

                            N Offline
                            N Offline
                            Nathan Minier
                            wrote on last edited by
                            #13

                            That sounds like a TPM-based encryption.... This should only be an issue if someone isn't backing up the TPM keys.

                            "There are three kinds of lies: lies, damned lies and statistics." - Benjamin Disraeli

                            G 1 Reply Last reply
                            0
                            • N Nathan Minier

                              That sounds like a TPM-based encryption.... This should only be an issue if someone isn't backing up the TPM keys.

                              "There are three kinds of lies: lies, damned lies and statistics." - Benjamin Disraeli

                              G Offline
                              G Offline
                              Gary Wheeler
                              wrote on last edited by
                              #14

                              Let me put it this way. Every time we've needed to recover a hard drive, the attempt has failed. That's why my group has their own servers, running without the corporate encryption, and our working data is backed up to those servers nightly.

                              Software Zen: delete this;

                              N 1 Reply Last reply
                              0
                              • G Gary Wheeler

                                Let me put it this way. Every time we've needed to recover a hard drive, the attempt has failed. That's why my group has their own servers, running without the corporate encryption, and our working data is backed up to those servers nightly.

                                Software Zen: delete this;

                                N Offline
                                N Offline
                                Nathan Minier
                                wrote on last edited by
                                #15

                                Security isn't doing their job then. It might be a good thing to remind them that Availability IS a leg in the triad.

                                "There are three kinds of lies: lies, damned lies and statistics." - Benjamin Disraeli

                                1 Reply Last reply
                                0
                                • OriginalGriffO OriginalGriff

                                  Talk to your manager - corporate rules don't have to make sense, but you flaunt them at your own risk. Many companies will start disciplinary processes for using "unapproved" sites and / or apps on company equipment. Just sayin', is all.

                                  Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...

                                  M Offline
                                  M Offline
                                  Maximilien
                                  wrote on last edited by
                                  #16

                                  Don't forget to talk to him about all the time and money you wasted taking care of that.

                                  I'd rather be phishing!

                                  1 Reply Last reply
                                  0
                                  • G Gary Wheeler

                                    Hmm. I never made that connection before. (thinks quietly; just ignore the sound of gear teeth breaking off) Nah. I don't think McAfee is competent to pull off any kind of extortion scheme. Besides, my wife and I are big fans of the old Perry Mason TV series[^], so I've learned how to counter every blackmail scheme known to man.

                                    Software Zen: delete this;

                                    OriginalGriffO Offline
                                    OriginalGriffO Offline
                                    OriginalGriff
                                    wrote on last edited by
                                    #17

                                    Gary Wheeler wrote:

                                    I don't think McAfee is competent to pull off any kind of extortion scheme.

                                    Hmmm. I'm pretty sure they are an extortion scheme: have you ever tried to remove their software once installed? :laugh:

                                    Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...

                                    "I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
                                    "Common sense is so rare these days, it should be classified as a super power" - Random T-shirt

                                    G 1 Reply Last reply
                                    0
                                    • OriginalGriffO OriginalGriff

                                      Gary Wheeler wrote:

                                      I don't think McAfee is competent to pull off any kind of extortion scheme.

                                      Hmmm. I'm pretty sure they are an extortion scheme: have you ever tried to remove their software once installed? :laugh:

                                      Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...

                                      G Offline
                                      G Offline
                                      Gary Wheeler
                                      wrote on last edited by
                                      #18

                                      Yes. The uninstall procedure was as follows: 1. Boot from a thumb drive. 2. Security wipe the primary drive. 3. Re-install Windows. 4. Re-install apps. 5. Reload data.

                                      Software Zen: delete this;

                                      OriginalGriffO 1 Reply Last reply
                                      0
                                      • J Jochen Arndt

                                        I was going to write that we don't have any guns here at work. But then I remembered that there is a compressed air powered nail gun somewhere in the work shop.

                                        N Offline
                                        N Offline
                                        Nagy Vilmos
                                        wrote on last edited by
                                        #19

                                        Jochen Arndt wrote:

                                        a compressed air powered nail gun somewhere in the work shop.

                                        From personal experience, **NEVER** let a drunk plumber in the vicinity of one of these.

                                        veni bibi saltavi

                                        J 1 Reply Last reply
                                        0
                                        • N Nagy Vilmos

                                          Jochen Arndt wrote:

                                          a compressed air powered nail gun somewhere in the work shop.

                                          From personal experience, **NEVER** let a drunk plumber in the vicinity of one of these.

                                          veni bibi saltavi

                                          J Offline
                                          J Offline
                                          Jochen Arndt
                                          wrote on last edited by
                                          #20

                                          Quote:

                                          NEVER let a drunk plumber in the vicinity of one of these.

                                          From personal experience too, craftsmen playing with tools of dissimilar trades are dangerous to your health.

                                          N 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups