|
Can you close it with "can't fix, out of our scope"?
|
# ? Jul 27, 2016 13:18 |
|
|
# ? Jun 8, 2024 09:28 |
|
You get bonus points if you can close the ticket while referencing latency between the two sites in terms of the speed of light. edit: it's 45ms ErIog fucked around with this message at 13:21 on Jul 27, 2016 |
# ? Jul 27, 2016 13:19 |
|
larchesdanrew posted:Throwing my vote in for this as the new thread title What happened with your contractors who apparently thought leaving everything unplugged was cool and good?
|
# ? Jul 27, 2016 13:52 |
|
larchesdanrew posted:Cool, nearest Apple store is only a 6 hour drive away You work for a school, we had something similar happen when I worked for a school because no one looked into how any of that worked and just dumped them to the masses. We were able to get it settled over the phone / email. Assuming you have a purchase order with all the serials in the schools name and can prove your with the school should be able to be remotely sorted in a few weeks real time, and about a dozen emails total. I'm not the one that sent the emails so I'm not sure what magic he used, we were also part of some program that gave schools discounts on bulk app store purchases which may have helped. Seriously try the email route first, be prepared to send all order information with the block of serials and the ones you need reset highlighted.
|
# ? Jul 27, 2016 13:53 |
|
Nerdrock posted:Apple enterprise support is surprisingly good. Give them a call. As someone who was involved with trying to unfuck the LAUSD iPad scheme I'd take this commendation with a pinch of salt.
|
# ? Jul 27, 2016 14:47 |
|
ErIog posted:You get bonus points if you can close the ticket while referencing latency between the two sites in terms of the speed of light. Of course then it'll get thrown back at you asking why you can't reduce the latency to 45ms. I mean, if light can do it, why can't your system?
|
# ? Jul 27, 2016 15:13 |
|
Smoke posted:Of course then it'll get thrown back at you asking why you can't reduce the latency to 45ms. I mean, if light can do it, why can't your system? "Because unlike light, digital signals need to stop and think for a bit on the way."
|
# ? Jul 27, 2016 17:11 |
|
Smoke posted:Of course then it'll get thrown back at you asking why you can't reduce the latency to 45ms. I mean, if light can do it, why can't your system? Sure, that'll be about 600 billion dollars, please. Cutting a borehole in a straight line between the two sites can shave off like 5 whole milliseconds, precious time to use for routing and signal regeneration. That's too much? Then I guess you don't need it after all!
|
# ? Jul 27, 2016 18:09 |
|
Anyone have any suggestions for cloud managed remote web filtering that will work on OSX 10.11? Our current solution decided El Capitan was too much trouble and decided to stop supporting it. Thanks jerks. We've got about 1000 MBAirs about to ship out across the country that needs to have the bare minimum filtering in place when on private networks.
|
# ? Jul 27, 2016 19:49 |
|
Can you name and shame the current vendor that caters for Macs but 10 months isn't enough time to get their product out?
|
# ? Jul 27, 2016 21:02 |
|
Thanks Ants posted:Can you name and shame the current vendor that caters for Macs but 10 months isn't enough time to get their product out? Edgewave's iPrism software. We've been using it for years because it was basically pain free setting it up. Now, not so much.
|
# ? Jul 27, 2016 21:07 |
|
Odd question I know, but where can I download Windows 8.0? I own a license but need the installer or the .iso file.
|
# ? Jul 27, 2016 22:11 |
|
Wilford Cutlery posted:Odd question I know, but where can I download Windows 8.0? I own a license but need the installer or the .iso file.
|
# ? Jul 27, 2016 22:15 |
|
For real?
|
# ? Jul 27, 2016 22:19 |
|
I believe so, yeah. Phone posting right now so can't check the Microsoft site.
|
# ? Jul 27, 2016 22:20 |
|
Wilford Cutlery posted:Odd question I know, but where can I download Windows 8.0? I own a license but need the installer or the .iso file. https://www.microsoft.com/en-us/software-download/windows8 Insert license key, download ISO and/or media creator.
|
# ? Jul 27, 2016 22:25 |
|
Note that if the license you own is OEM, because Microsoft won't give it to you.
|
# ? Jul 27, 2016 22:31 |
|
Terminal posted:https://www.microsoft.com/en-us/software-download/windows8 Already have this and I don't think it's going to help...
|
# ? Jul 27, 2016 22:33 |
|
Ok that brings me to the question I really wanted to ask: Why do you need Windows 8.0?
|
# ? Jul 27, 2016 22:40 |
|
I've had to the ISOs before and run the MD5 hash against what's published on TechNet. But I am also intrigued about Windows 8.
|
# ? Jul 27, 2016 22:45 |
|
Thanks Ants posted:I've had to the ISOs before and run the MD5 hash against what's published on TechNet. But I am also intrigued about Windows 8. You should not use md5 for that but sha256 or better, because it's very much possible to generate a modified ISO with malware that collides to the same hash.
|
# ? Jul 27, 2016 22:56 |
|
That 8.1 installer does take 8.0 keys, if that's what you're worried about.
|
# ? Jul 27, 2016 23:08 |
|
Inspector_666 posted:Ok that brings me to the question I really wanted to ask: Why do you need Windows 8.0? Reviving an old desktop, wanted to put Windows 10 on it but ran into an error saying it couldn't be installed because the processors don't support CompareExchange128 (this is a pair of dual-core socket 940 AMD Opterons). Did a bit of reading and it seems like this started being enforced with the upgrade to 8.1, so the highest I can go is 8.0 I've also read that there is a workaround to get 8.1 or 10 going, by upgrading to 32-bit then installing 64-bit via DVD or something like that. Maybe I'll get lucky. In the meantime I found a download and will check its SHA1 hash.
|
# ? Jul 27, 2016 23:09 |
|
spankmeister posted:You should not use md5 for that but sha256 or better, because it's very much possible to generate a modified ISO with malware that collides to the same hash. Interesting. Will bear that in mind if I need to do it again - I try to avoid needing old versions of Windows and if I do we have it licensed with SA so it comes direct from Microsoft. I don't think they publish hashes any stronger than SHA1, or didn't when I last checked.
|
# ? Jul 27, 2016 23:16 |
|
spankmeister posted:You should not use md5 for that but sha256 or better, because it's very much possible to generate a modified ISO with malware that collides to the same hash. Listen to this, it has been true for pretty long time.
|
# ? Jul 27, 2016 23:20 |
|
Is sha1 broken too?
|
# ? Jul 27, 2016 23:45 |
|
Gilok posted:Is there a way to create a Windows profile for a domain user without having them log in? I occasionally get passwords from more... challenged users when I'm setting up a new computer so I can put their files in the right places and set up their wifi cert and so forth. Just caught up in this thread and replying to this from a few pages back. Learn how to use Microsoft's USMT. If the user's old computer is still running (and their profile isn't hosed up to begin with), you can migrate it from the old machine to the new one and have to configure very little one they are logged in to the new machine.
|
# ? Jul 28, 2016 00:24 |
|
stubblyhead posted:Is sha1 broken too?
|
# ? Jul 28, 2016 01:03 |
|
A user today sent a ticket asking that their keyboard be cleaned or replaced. They're the only ones who have used it since it was issued. I promptly went to their desk and told them to clean their own loving keyboard. Ticket resolved.
|
# ? Jul 28, 2016 01:32 |
|
Chickenwalker posted:A user today sent a ticket asking that their keyboard be cleaned or replaced. They're the only ones who have used it since it was issued. I promptly went to their desk and told them to clean their own loving keyboard. Ticket resolved. drat goti, you bold. I don't think I would ever 1:1 user's keyboard or mouse but if you have management's backing to be "firm" like that have at it.
|
# ? Jul 28, 2016 02:32 |
|
incoherent posted:drat goti, you bold. I don't think I would ever 1:1 user's keyboard or mouse but if you have management's backing to be "firm" like that have at it. At a place I used to work at the local deployment person adamantly refused to do any cleaning. Employees / Contractors would turn their filthy laptops back in, and she'd reimage them and hand them back out to someone else. I didn't mind using company time to clean it myself, kind of an annoying stance to take though on their end.
|
# ? Jul 28, 2016 02:35 |
|
PBS posted:At a place I used to work at the local deployment person adamantly refused to do any cleaning. Employees / Contractors would turn their filthy laptops back in, and she'd reimage them and hand them back out to someone else. That's loving gross. I'd be embarrassed to give out a keyboard or laptop that was dirty from another user. I always clean that poo poo with wipes.
|
# ? Jul 28, 2016 02:42 |
|
I don't know what I'd do if I got offered a filthy laptop.
|
# ? Jul 28, 2016 02:52 |
|
GreenNight posted:That's loving gross. I'd be embarrassed to give out a keyboard or laptop that was dirty from another user. I always clean that poo poo with wipes. Lucky the keyboards were generally new. Though there were some shared workspaces with some really gross keyboards. (I had to buy my own wireless mouse/keyboard to avoid this) Dr. Arbitrary posted:I don't know what I'd do if I got offered a filthy laptop. Smile and say thanks. Some people just aren't worth pissing off. She was annoying to deal with, but everything would have been much more so if she'd particularly disliked me.
|
# ? Jul 28, 2016 02:59 |
flosofl posted:Well it's been considered broken for about 10 years. I think it was last year someone successfully demonstrated a collision attack against it. As long as it's salted and keystretched it doesn't really matter what algorithm (within reason) you use, right? Not that there's any reason not to just use sha256 anyway. https://crackstation.net/hashing-security.htm (this is for passwords but I imagine the principle is the same)
|
|
# ? Jul 28, 2016 03:54 |
|
PBS posted:At a place I used to work at the local deployment person adamantly refused to do any cleaning. Employees / Contractors would turn their filthy laptops back in, and she'd reimage them and hand them back out to someone else. We clean keyboards when there's turnover from one user to another or gear is pulled back into inventory. But if I issue you something it's your responsibility to maintain it until you leave the company. I'll be damned if you're going to eat Cheetos over your keyboard every day and then send a ticket asking me to come clean it for you like I'm the loving maid. My job title is not rear end Wiper General.
|
# ? Jul 28, 2016 04:17 |
|
Chickenwalker posted:We clean keyboards when there's turnover from one user to another or gear is pulled back into inventory. But if I issue you something it's your responsibility to maintain it until you leave the company. I'll be damned if you're going to eat Cheetos over your keyboard every day and then send a ticket asking me to come clean it for you like I'm the loving maid. My job title is not rear end Wiper General. Lol, I wish some of the keyboards I've seen only had cheetos in them. My old lead's keyboard was the most disgusting thing I'd ever seen in my life. Full of various crumbs, and the entire thing was coated in random mystery stains. I'm pretty sure they'll throw that one out when he moves on.
|
# ? Jul 28, 2016 04:24 |
|
Data Graham posted:As long as it's salted and keystretched it doesn't really matter what algorithm (within reason) you use, right? Not that there's any reason not to just use sha256 anyway.
|
# ? Jul 28, 2016 04:28 |
|
Data Graham posted:As long as it's salted and keystretched it doesn't really matter what algorithm (within reason) you use, right? Not that there's any reason not to just use sha256 anyway. What does "salted and keystretched" mean in the context of validating a file's integrity?
|
# ? Jul 28, 2016 04:37 |
|
|
# ? Jun 8, 2024 09:28 |
I guess the principle isn't the same then, never mind. (I thought the hashes generated from the ISO images would be done using the same techniques as passwords and the same mitigations against false collisions.) Data Graham fucked around with this message at 05:06 on Jul 28, 2016 |
|
# ? Jul 28, 2016 05:02 |