Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
Super Slash
Feb 20, 2006

You rang ?
Now just imagine travelling back in time at that very moment to demonstrate a 256gb Micro SD card.

Adbot
ADBOT LOVES YOU

Thanks Ants
May 21, 2004

#essereFerrari


Super Slash posted:

Now just imagine travelling back in time at that very moment to demonstrate a 256gb Micro SD card.

Methanar
Sep 26, 2013

by the sex ghost

Super Slash posted:

Now just imagine travelling back in time at that very moment to demonstrate a 256gb Micro SD card.

Sounds like a great way to get kidnapped by the government because that's obviously alien technology.

Sywert of Thieves
Nov 7, 2005

The pirate code is really more of a guideline, than actual rules.

Dr. Arbitrary posted:

You ever look at old games and wonder like, what's Dave Baskin up to these days?
https://www.youtube.com/watch?v=BSC7K6nbD90

Edit:

Anyways, we got a new computer and I couldn't play this game anymore, even when using the turbo button.

I remember owning my nieces at this game once I discovered you could move with the arrow keys as well as the 1,2,3 buttons (which was way faster). :smug:

Sefal
Nov 8, 2011
Fun Shoe

This made me laugh way harder than it should.
Thank you.

Agrikk
Oct 17, 2003

Take care with that! We have not fully ascertained its function, and the ticking is accelerating.

DelphiAegis posted:

I took some time to program, in BASIC, 99 bottles of beer on the wall. Except I can't remember what happened when we got to 0 now.

If $bottleCount=0 then print "No more bottles of beer on the wall."

HTH

Zil
Jun 4, 2011

Satanically Summoned Citrus


Zil posted:

Follow up, shits still broke. People still pissed. My liver will suffer this weekend.

http://status.apps.rackspace.com/in...dents?group=100

Follow up to the follow up, everything appears to be on fire, downtime nearing the hundred hour mark. Users are pissed and rioting may be imminent. Have locked my office door in attempt to give time to escape out the window.

Send booze help.

Zil fucked around with this message at 15:16 on Jul 17, 2017

Judge Schnoopy
Nov 2, 2005

dont even TRY it, pal
Keep a whiteboard on your door that says "Uptime 99.999" and keep erasing 9s as the days go on. 100 hours I think drops you to just "99%" but it still looks fancy when people come to your door with pitchforks.

Bunni-kat
May 25, 2010

Service Desk B-b-bunny...
How can-ca-caaaaan I
help-p-p-p you?

Judge Schnoopy posted:

. 100 hours I think drops you to just "99%" but it still looks fancy when people come to your door with pitchforks.

98.9%

:goonsay:

Chunjee
Oct 27, 2004

Chunjee posted:

So tired of everyone using their own mappings.
IG1 -> ix-TIX -> TIX -> key_id_TIX -> TIX


3rd party found their bug. basically strReplace("ix","") lol

This exact problem just hit again today. Fix never went into prod because of code freeze. Maybe I'm dumb but how weak do you have to be to not push for an exception when it makes sense.

Fortis
Oct 21, 2009

feelin' fine
A ticket came in. Sorry, I mean A TICKET CAME IN.

Subject: PHONE

quote:

I NEED A PHONE
(they have one but moved desks without mentioning it to us and didn't take it with them)

Previously from this same person:

quote:

Hey I need some ink tonner in my printer
:allears:

pixaal
Jan 8, 2004

All ice cream is now for all beings, no matter how many legs.


Most people seem to think you need to do something for a phone to work at a different desk. People are constantly shocked when I tell them to just move the phones instead of giving me a list of 20 people that are playing musical chairs.

Look if you don't want to do it I'll go down there and do it because it's quicker, the UI to change this stuff is garbage and takes about 3-4 minutes per phone and no way to do multiple at the same time. You just gave me an hour of work to do on the backend, or 20 minutes going around getting all the phone, or each person can do it and it's 5 minutes.

People are happy to just go pick up their old phone thankfully, but I'd seriously run around like a moron over dealing with the lovely phone's lovely backend.

Thanks Ants
May 21, 2004

#essereFerrari


Phones are second only to printers on the list of "things you should try really loving hard to have nothing to do with"

SamDabbers
May 26, 2003



pixaal posted:

Most people seem to think you need to do something for a phone to work at a different desk. People are constantly shocked when I tell them to just move the phones instead of giving me a list of 20 people that are playing musical chairs.

To be fair, it used to be this way before IP phones came around.

pixaal posted:

Look if you don't want to do it

This has always been the case, and is unlikely to change.

Boogalo
Jul 8, 2012

Meep Meep




We have IP phones that hold onto their number so you can just move them around but main grounds still makes us put in a moverequest with them and charges us money for the move just so they can keep the E911 database up to date.

pixaal
Jan 8, 2004

All ice cream is now for all beings, no matter how many legs.


Boogalo posted:

We have IP phones that hold onto their number so you can just move them around but main grounds still makes us put in a moverequest with them and charges us money for the move just so they can keep the E911 database up to date.

Our E911 is set to the primary site by the software and as a "security" feature can only be changed by the end user not an admin. Guess how many remote users have setup their E911 info? It's the same number of remote that even know you CAN log into the web portal and do all sorts of stuff for your phone. The answer is 0. I have 1 user at the primary site that has logged in and they use it all the drat time for everything. They don't even use their desktop they paired bluetooth with their computer and are using the soft phone because they prefer that.

If the person wasn't so close to retiring that a career shift would be insanity I'd seriously try and get them to make use of their love of phones working in IT as a dedicated phone specialist. They are also a crabby user and refuse to help anyone mostly with "if I can figure it out they can too *mumbled laughter* if they can't you can!"

Super Slash
Feb 20, 2006

You rang ?

pixaal posted:

Most people seem to think you need to do something for a phone to work at a different desk. People are constantly shocked when I tell them to just move the phones instead of giving me a list of 20 people that are playing musical chairs.
Yeah man gently caress that. Although we aren't exactly setup for hot desking people can pretty much jump on any machine to use, so I just tell them to pop out the "red" cable and take the phone and pop it back in your new seat (Blessed be power over ethernet).

MF_James
May 8, 2008
I CANNOT HANDLE BEING CALLED OUT ON MY DUMBASS OPINIONS ABOUT ANTI-VIRUS AND SECURITY. I REALLY LIKE TO THINK THAT I KNOW THINGS HERE

INSTEAD I AM GOING TO WHINE ABOUT IT IN OTHER THREADS SO MY OPINION CAN FEEL VALIDATED IN AN ECHO CHAMBER I LIKE

Thanks Ants posted:

Phones are second only to printers on the list of "things you should try really loving hard to have nothing to do with"

This x1000

vanity slug
Jul 20, 2010

phones are hell, printers are hell, faxes are both

Bigass Moth
Mar 6, 2004

I joined the #RXT REVOLUTION.
:boom:
he knows...
Phones are great, the user's one-off requests are the bad part.

Faxes should have been eliminated from the planet the very second the first email was sent.

FlapYoJacks
Feb 12, 2009
Why would any company with its own PBX have it setup in such a way that accounts are tied to the IP of the phone? :psyduck:

Or am I reading that wrong and somehow moving a phone requires more than "plug it in" after its provisioned because of another reason than tying it to the IP?

stevewm
May 10, 2005

Jeoh posted:

phones are hell, printers are hell, faxes are both

I guess I've been lucky on the phone front.. Our phone requirements are simple. No one has assigned phones/desks, and there is no dedicated operator/receptionist. (these are retail stores).

We use Avaya IP Office 500 systems in Basic mode with digital sets (not IP) and POTS lines. No VoIP at all. The only thing I have to change outside of the default configuration is the number of POTS lines available, which port is the paging output, and set-up an after hours announcement. We don't even use voicemail at our branch locations. Plug in the phones and it's ready to go.

Phones are on physically separate wiring from the LAN, but its all CAT5e to RJ45 jacks and patch panels, so we could go with IP phones in the future.

We come from Avaya Partner ACS analog systems; IP Office 500 in Basic mode basically emulates 95% of the Partner ACS system behaviors and functionality.

Once configured and working, with exception of changing the after hours announcement occasionally, we never have to touch the config or the system itself again.

Judge Schnoopy
Nov 2, 2005

dont even TRY it, pal

ratbert90 posted:

Why would any company with its own PBX have it setup in such a way that accounts are tied to the IP of the phone? :psyduck:

Or am I reading that wrong and somehow moving a phone requires more than "plug it in" after its provisioned because of another reason than tying it to the IP?

PBXs more commonly tie accounts to MAC addresses, not IPs. A well configured DHCP server can provide options so the PBX updates the 911 location, but I think this is incredibly rare to see in use. So if a phone is carried from Building A Floor 2 to Building B Floor 1, the 911 data will not be correct. In most cases the PBX will have to be updated to put the phone in a different 911 location pool.

Agrikk
Oct 17, 2003

Take care with that! We have not fully ascertained its function, and the ticking is accelerating.

Thanks Ants posted:

Phones are second only to printers on the list of "things you should try really loving hard to have nothing to do with"

Sharepoint: hold my beer

Judge Schnoopy
Nov 2, 2005

dont even TRY it, pal
I really enjoy working with CUCM on a regular basis and have no problems managing phones on the day-to-day.

Sharepoint can stuff a flaming lemon up it's rear end in a top hat.

Zero VGS
Aug 16, 2002
ASK ME ABOUT HOW HUMAN LIVES THAT MADE VIDEO GAME CONTROLLERS ARE WORTH MORE
Lipstick Apathy
A wild goose chase ticket came in...

Some mystery employee is harassing a female coworker, and they did so by way of a Google Form.

I have the email address the Google Form was sent from.

Is there an easy way (i.e. an app) to log in to each PC we have by way of administrative share, and check for saved logins in Chrome? I don't need the passwords, I just need to see if anyone has a saved login that matches that Gmail address and they're busted. I doubt they went through the trouble of covering their tracks with Incognito or anything.

pixaal
Jan 8, 2004

All ice cream is now for all beings, no matter how many legs.


ratbert90 posted:

Why would any company with its own PBX have it setup in such a way that accounts are tied to the IP of the phone? :psyduck:

Or am I reading that wrong and somehow moving a phone requires more than "plug it in" after its provisioned because of another reason than tying it to the IP?

Users think it requires more, which can lead to headaches where you go to the building across the street and just do it yourself because they don't believe you that you don't need to mess with stuff on the server.

Zil
Jun 4, 2011

Satanically Summoned Citrus


Zero VGS posted:

A wild goose chase ticket came in...

Some mystery employee is harassing a female coworker, and they did so by way of a Google Form.

I have the email address the Google Form was sent from.

Is there an easy way (i.e. an app) to log in to each PC we have by way of administrative share, and check for saved logins in Chrome? I don't need the passwords, I just need to see if anyone has a saved login that matches that Gmail address and they're busted. I doubt they went through the trouble of covering their tracks with Incognito or anything.

I mean if you have admin access, you could do a windows search but include file contents and search for that specific email address. Wouldn't there also be connection logs around the time that form was submitted, can just narrow it down to whom was on the form around that time.

Zamboni Apocalypse
Dec 29, 2009
Oh goodie, phones. We've been using Cisco IP phones here for 8+ years (IE, since I got hired back on) with no serious issues that I know of. Multiple buildings spread across the city, no problem really, phone number would follow you if you moved. :eng101:

Until *someone* decided that all the 4-digit phone numbers *really really* needed an additional 2-digit prefix attached, to designate what location/program that person/department was located at! ("*Someone*" being some clueless C-level, I'm sure.)

So now, everyone has a number that changes every time they change locations. ::eng99: Did I mention this is included on everyone's business cards, appointment cards, various pre-populated paperwork and of course passed on to the mentally-ill clientele?

:smithicide:

Thanks Ants
May 21, 2004

#essereFerrari


If I want to QoS stuff going across an IPsec tunnel, I need to QoS the traffic and then also QoS the tunnel, I assume? Anybody know how to do that on a FortiGate, since I'm doing a basic rule (from any to any protocol 50) and not getting any hits.

I'm aware that QoS and VPN tunnels across the Internet isn't a great idea, but it's for testing at the moment until we switch to a non poo poo-tier ISP that offers ExpressRoute.

The Fool
Oct 16, 2003


Zero VGS posted:

A wild goose chase ticket came in...

Some mystery employee is harassing a female coworker, and they did so by way of a Google Form.

I have the email address the Google Form was sent from.

Is there an easy way (i.e. an app) to log in to each PC we have by way of administrative share, and check for saved logins in Chrome? I don't need the passwords, I just need to see if anyone has a saved login that matches that Gmail address and they're busted. I doubt they went through the trouble of covering their tracks with Incognito or anything.

Phone posting, so I don't have a link, but nirsoft has a tool that will do this.

Collateral Damage
Jun 13, 2009

Super Slash posted:

Now just imagine travelling back in time at that very moment to demonstrate a 256gb Micro SD card.
I've saved an issue of a local computer magazine from 1988 where there's a small article about the first gigabyte SCSI hard drive becoming available, and it mentions that "it's intended for companies with extreme storage needs, and it's unlikely that end users will ever have a need for hard drives this large." :shobon:

MREBoy
Mar 14, 2005

MREs - They're whats for breakfast, lunch AND dinner !

Collateral Damage posted:

I've saved an issue of a local computer magazine from 1988 where there's a small article about the first gigabyte SCSI hard drive becoming available, and it mentions that "it's intended for companies with extreme storage needs, and it's unlikely that end users will ever have a need for hard drives this large." :shobon:

I have a receipt somewhere that proves I paid something like $749 bucks for a 1.000 gig Micropolis 50 pin SCSI drive circa 1995. I needed it for my Macintosh Performa 600 (4mb ram, 160mb HD, 68030 @ 32mhz) because I filled up the 160 megger.

MF_James
May 8, 2008
I CANNOT HANDLE BEING CALLED OUT ON MY DUMBASS OPINIONS ABOUT ANTI-VIRUS AND SECURITY. I REALLY LIKE TO THINK THAT I KNOW THINGS HERE

INSTEAD I AM GOING TO WHINE ABOUT IT IN OTHER THREADS SO MY OPINION CAN FEEL VALIDATED IN AN ECHO CHAMBER I LIKE

Thanks Ants posted:

If I want to QoS stuff going across an IPsec tunnel, I need to QoS the traffic and then also QoS the tunnel, I assume? Anybody know how to do that on a FortiGate, since I'm doing a basic rule (from any to any protocol 50) and not getting any hits.

I'm aware that QoS and VPN tunnels across the Internet isn't a great idea, but it's for testing at the moment until we switch to a non poo poo-tier ISP that offers ExpressRoute.

I have not done QoS over an IPsec tunnel in a fortigate, but I know for QoS to work on standard ports you need to put inbound/outbound bandwidth (so if it's you WAN you put in your WAN down/up rates) so that QoS knows when to start dropping packets, this can only be done via CLi. Here is the KB article for that: http://kb.fortinet.com/kb/documentLink.do?externalID=FD36248

You might just need to contact their support about doing it over an IPSec tunnel though, especially since you aren't seeing hits on the policy, sorry I can't help further :(


Also just found this:

VLAN, VDOM and virtual interfaces
Policy-based traffic shaping does not use queues directly. It shapes the traffic and if the
packet is allowed by the security policy, then a priority is assigned. That priority controls
what queue the packet will be put in upon egress. VLANs, VDOMs, aggregate ports and
other virtual devices do not have queues and as such, traffic is sent directly to the
underlying physical device where it is queued and affected by the physical ports.
This is also the case with IPsec connections.

http://docs.fortinet.com/uploaded/files/1049/fortigate-traffic-shaping-40-mr3.pdf


So it seems if you follow the KB for setting up QoS, it should apply to the IPSec tunnel once you get it all setup correctly, at least that's what I am gleaning from reading that.

MF_James fucked around with this message at 00:36 on Jul 18, 2017

Zero VGS
Aug 16, 2002
ASK ME ABOUT HOW HUMAN LIVES THAT MADE VIDEO GAME CONTROLLERS ARE WORTH MORE
Lipstick Apathy

The Fool posted:

Phone posting, so I don't have a link, but nirsoft has a tool that will do this.

Thanks, Nirsoft ChromePass works if I path it to \\PCname\c$\Users\User

DelphiAegis
Jun 21, 2010
A ticket came in... And it was not worked. Summer is our slower season, so instead of a stupid convoluted process of call - > ticket - > t2 investigate - > email - > t2 in another department investigate - > client -> response then back through that entire chain clusterfick, we figured to let the t2 Dept that was separate and now merged just work the ticket directly.

And they won't. My team has sub-day Turn around times (internal SLA is 5 bad) whereas they have items not touched since before the July holiday.

Going to be fun watching their feet held to the fire. :v:

Ursine Catastrophe
Nov 9, 2009

It's a lovely morning in the void and you are a horrible lady-in-waiting.



don't ask how i know

Dinosaur Gum
A ticket came in...a month ago. And was completely untouched for the entire duration until the reporting person followed up to ask what the heck was going on.

Apparently it went something like this:
1. User files a bug on $Application
2. The Tier 1 support in question has no list of "what team owns what apps" (:psyduck:)
3. Tier 1 support searches Jira for tickets relating to $Application in an attempt to figure out who owns it, but our reporting software searches don't sort by "Last Updated" by default so
4. Tier 1 support, using a dead ticket last updated six years ago, assigns the new ticket to the account of a QA contractor that hasn't worked here in at least that long.
5. A month later, User follows up and escalates to T2 support, who comes to me and asks if there's been any movement on this ticket that I didn't know existed until that point.
6. Bug is resolved and deployed in under a business day. :toot:


Nobody's being thrown under any bus about this, which is Good, but the real :psyduck: is that my question about "how can we make sure this doesn't happen again" has been met with pretty much "I'm sure it'll be fine" at all levels. Compounding the :psyduck: is that I know we have at least 3 locations where app ownership is recorded and kept up-to-date for ops, noc, and security escalations, but apparently support just isn't in on that loop for reasons?

I guess we just hate money, since the user in question was on the cusp of cancelling a subscription with us over a bug that took all of five minutes of dev time to fix :buddy:

SEKCobra
Feb 28, 2011

Hi
:saddowns: Don't look at my site :saddowns:

Zero VGS posted:

A wild goose chase ticket came in...

Some mystery employee is harassing a female coworker, and they did so by way of a Google Form.

I have the email address the Google Form was sent from.

Is there an easy way (i.e. an app) to log in to each PC we have by way of administrative share, and check for saved logins in Chrome? I don't need the passwords, I just need to see if anyone has a saved login that matches that Gmail address and they're busted. I doubt they went through the trouble of covering their tracks with Incognito or anything.

This is also horribly illegal since you are remotely accessing data you have no right to access, by the sound of it you are also aware that these are private credentials, which a company is not allowed to use ever. This is almost on the same level as hijacking a employees browser/session/login info to 'check their facebook' or something like that.
Not even the police is allowed to do what you are attempting without a (very restrictive and hard to get) warrant. Probably also matches several federal laws about hacking, I advise you document this and clearly state to your employer that you can not fulfill this request and that sexual harassment needs to be referred to the police. Do not do this without a written order, preferably on paper. Even then you might still be personally liable.

E: I know it is easy to forget with all the technical possibilities we have as administrators, but the legal implications (thankfully) are still there when it comes to interfering with things that are considered 'private'. Just because you can reset any users windows password and then log into their private email and online banking and whatever else they might have used at work, doesn't mean you should. I guess windows needs the good old linux sudo prompt as a reminder as well.

code:
We trust you have received the usual lecture from the local System
Administrator. It usually boils down to these three things:

    #1) Respect the privacy of others.
    #2) Think before you type.
    #3) With great power comes great responsibility.

SEKCobra fucked around with this message at 07:43 on Jul 18, 2017

Samizdata
May 14, 2007

SEKCobra posted:

This is also horribly illegal since you are remotely accessing data you have no right to access, by the sound of it you are also aware that these are private credentials, which a company is not allowed to use ever. This is almost on the same level as hijacking a employees browser/session/login info to 'check their facebook' or something like that.
Not even the police is allowed to do what you are attempting without a (very restrictive and hard to get) warrant. Probably also matches several federal laws about hacking, I advise you document this and clearly state to your employer that you can not fulfill this request and that sexual harassment needs to be referred to the police. Do not do this without a written order, preferably on paper. Even then you might still be personally liable.

E: I know it is easy to forget with all the technical possibilities we have as administrators, but the legal implications (thankfully) are still there when it comes to interfering with things that are considered 'private'. Just because you can reset any users windows password and then log into their private email and online banking and whatever else they might have used at work, doesn't mean you should. I guess windows needs the good old linux sudo prompt as a reminder as well.

code:
We trust you have received the usual lecture from the local System
Administrator. It usually boils down to these three things:

    #1) Respect the privacy of others.
    #2) Think before you type.
    #3) With great power comes great responsibility.

Depends on the site policy. If they show that harassment came from company resources, I think they would be able to get away with it, if their policy people aren't complete idiots.

Adbot
ADBOT LOVES YOU

SEKCobra
Feb 28, 2011

Hi
:saddowns: Don't look at my site :saddowns:

Samizdata posted:

Depends on the site policy. If they show that harassment came from company resources, I think they would be able to get away with it, if their policy people aren't complete idiots.

Since it isn't a company email (or he wouldn't have to search the local PCs) it isn't a company resource. Doesn't matter if he might have used the PC (which you can't prove anyway, even if that email is stored anywhere) you still can't illegally search for it.

  • Locked thread