Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
22 Eargesplitten
Oct 10, 2010



ACValiant posted:

Anyone have any experience working contract-to-hire jobs? A recruiter reached out on LinkedIn about one and the idea seems scary to me but I don't have a lot of experience with them. Maybe I shouldn't be?

Do you have a permanent position? Is it a huge upgrade? If yes and no, respectively, don’t do it. If finances go bad, you won’t get converted. You don’t get holidays or PTO, the health insurance is going to be crappy (and might be gone depending on what healthcare bill passes), and you tend to get paid less than if you were a FTE. At least that last part is my experience. It might be a regional thing, some people say they got paid more.

Around here it’s 90% of positions at least until you get pretty far up the food chain. At this point it would have to be a hell of a job or my job would have to be hell to go back to C2H.

Adbot
ADBOT LOVES YOU

Bald Stalin
Jul 11, 2004

Our posts
Never worked a contract job that paid less per hour than employee. That makes no sense and would be a massive fuckin' red flag.

The real question is:

Would you take this job if it was only going to be contract and not converted? If the answer is no, then don't. Simple.

Antioch
Apr 18, 2003

Thank you for this.

Dick Trauma posted:

I lived here in L.A. back in '82 when Blade Runner came out, and I remember that opening shot and hoooolllllly poo poo my brain started to melt. It was an amazing experience. 2019 seemed so far away!

The night sky here often has that weird brown color, and if you were up in the hills looking down into the valley it already looked so much like the movie. I would drive along Mulholland with the score playing, and pull into one of the little parking areas and listen to the music while I watched the lights.

It's VERY strange to be here in 2018 and think back to the day I watched Blade Runner.

God drat dude, that sounds loving magical. Like I want to just get high and you can tell me stories about LA in the 80s.

adorai
Nov 2, 2002

10/27/04 Never forget
Grimey Drawer

Ranter posted:

Never worked a contract job that paid less per hour than employee. That makes no sense and would be a massive fuckin' red flag.
There are two kinds of contracting. 1099 and w2 at a third party. w2 at a third party usually isn't going to pay as much as an fte at the company you are sitting at, because they are performing the work for the same amount or less, and have to skim off the top for their administrative function.

GnarlyCharlie4u
Sep 23, 2007

I have an unhealthy obsession with motorcycles.

Proof
Hey it's been a while since we've talked about Antivirus software, so...

https://twitter.com/SwiftOnSecurity/status/952282362016075776

https://twitter.com/4n68r/status/952213822252683264

GnarlyCharlie4u fucked around with this message at 16:35 on Jan 14, 2018

YOLOsubmarine
Oct 19, 2004

When asked which Pokemon he evolved into, Kamara pauses.

"Motherfucking, what's that big dragon shit? That orange motherfucker. Charizard."

adorai posted:

There are two kinds of contracting. 1099 and w2 at a third party. w2 at a third party usually isn't going to pay as much as an fte at the company you are sitting at, because they are performing the work for the same amount or less, and have to skim off the top for their administrative function.

This isn’t necessarily true. I’ve worked W2 contract-to-hire where I was paid notably better than the fte’s. The fate gets he benefits of not carrying those salary liabilities on their balance sheet and having an easier route to a lawsuit free firing. Plus the benefits will often be worse at the contracting company.

Bald Stalin
Jul 11, 2004

Our posts

adorai posted:

There are two kinds of contracting. 1099 and w2 at a third party. w2 at a third party usually isn't going to pay as much as an fte at the company you are sitting at, because they are performing the work for the same amount or less, and have to skim off the top for their administrative function.

I've been a W2 sub contractor and because the company I was technically an employee of had lovely benefits vs. the company I was placed at for 12 months on a project, I made more than the employees per hour. But I didn't have 401k matching, 3 weeks paid vacation, if the office shut down and no one was working then I didn't get paid etc.

Where I am at now we use Tek Systems for desktop techs (and are about to switch to a better, smaller provider that gives their employees ((our techs)) 401k matching and paid vacation for the same $) and because we found the techs ourselves then referred them to tek systems, we dictated exactly how much a. the tech gets paid and b. how much we pay tek total (so we know exactly how much they're skimming for taking on the liability of a W2 employee).

Bald Stalin fucked around with this message at 18:43 on Jan 14, 2018

YOLOsubmarine
Oct 19, 2004

When asked which Pokemon he evolved into, Kamara pauses.

"Motherfucking, what's that big dragon shit? That orange motherfucker. Charizard."

Hope y’all didn’t already patch your ESX hosts for Spectre.

https://kb.vmware.com/s/article/52345

CLAM DOWN
Feb 13, 2007




YOLOsubmarine posted:

Hope y’all didn’t already patch your ESX hosts for Spectre.

https://kb.vmware.com/s/article/52345

ahaahaha

Dick Trauma
Nov 30, 2007

God damn it, you've got to be kind.

Antioch posted:

God drat dude, that sounds loving magical. Like I want to just get high and you can tell me stories about LA in the 80s.

One of the few interesting parts of my life was being a teenager in Los Angeles from the early eighties onward. Culturally it was the heart of that era, even if like all past times it gets horribly mangled by the generations that followed.

I owned no headbands nor any ripped sweatshirts.

Thanks Ants
May 21, 2004

#essereFerrari



https://www.youtube.com/watch?v=-h1F93EJIds

Dick Trauma
Nov 30, 2007

God damn it, you've got to be kind.
The CEO has discovered that our Glassdoor page has one review, a very negative one from someone the company hosed over. He emailed general counsel, the COO and myself asking how he can get the review removed, if there's legal action we can take against the former employee, or if (like at the Tony job) we can oblige all of our employees to write a favorable review.

I hate these loving people. They're all the same.

Thanks Ants
May 21, 2004

#essereFerrari


lmao that's always their response. At no point would they be prepared to take some responsibility for the events or environment that was created that led to somebody leaving on bad terms.

We've had probably in excess of ten people leave our company and cite one person as the reason why, who happens to be the CEO. There's always a lot of mental gymnastics that get deployed to make excuses.

Bald Stalin
Jul 11, 2004

Our posts
Leave your own bad review. Encourage others to do the same.

kensei
Dec 27, 2007

He has come home, where he belongs. The Ancient Mariner returns to lead his first team to glory, forever and ever. Amen!


YOLOsubmarine posted:

Hope y’all didn’t already patch your ESX hosts for Spectre.

https://kb.vmware.com/s/article/52345



I'm at home but it's blank for me. What does it say?

Grassy Knowles
Apr 4, 2003

"The original Terminator was a gritty fucking AMAZING piece of sci-fi. Gritty fucking rock-hard MURDER!"

kensei posted:

I'm at home but it's blank for me. What does it say?

Intel Sightings in ESXi Bundled Microcode Patches for VMSA-2018-0004 (52345)
Document Id
52345
Purpose
Although VMware strongly recommends that customers obtain microcode patches through their hardware vendor, as an aid to customers, VMware also included the initial microcode patches in ESXi650-201801402-BG, ESXi600-201801402-BG, and ESXi550-201801401-BG. Intel has notified VMware of recent sightings that may affect some of the initial microcode patches that provide the speculative execution control mechanism for a number of Intel Haswell and Broadwell processors. The issue can occur when the speculative execution control is actually used within a virtual machine by a patched OS. At this point, it has been recommended that VMware remove exposure of the speculative-execution mechanism to virtual machines on ESXi hosts using the affected Intel processors until Intel provides new microcode at a later date.
Resolution
Note: All the patches associated with VMSA-2018-0004 have been pulled back from the online and offline portal.
VUM Customer who has already downloaded the patches associated with VMSA-2018-0004 would continue to persist in the VUM depot even after the EP is rolled-back. But, if customer tries to remediate the corresponding patch baseline created against the bulletins of these patches, following error would be encountered - "Cannot download software packages from patch source".
For Customers who have configured UMDS for offline patching, the patches associated with VMSA-2018-0004 continue to persist in the UMDS depot directory even after roll-back and can be patched successfully from the same. It is recommended that such customers manually remove the binaries/VIBs from the UMDS directory or direct the downloads to the new UMDS directory location to be in-sync with VMware’s online depot. For more information see How to configure the UMDs download location.
Customers who use Stateless boot through Autodeploy will have to update the existing rule to point to the image profile associated with VMSA-2018-0002 instead. If you continue without updating rule, the Autodeploy would stateless boot into the image associated with VMSA-2018-0004 which is not intended.
For ESXi hosts that have not yet applied one of the following patches ESXi650-201801402-BG, ESXi600-201801402-BG, or ESXi550-201801401-BG, VMware recommends not doing so at this time. It is recommended to apply the patches listed in VMSA-2018-0002 instead.

For servers using the Intel Haswell and Broadwell processors (see Table 1 for the specific list of affected VMware vSphere supported Intel Haswell and Broadwell processors) that have applied ESXi650-201801402-BG, ESXi600-201801402-BG, or ESXi550-201801401-BG VMware recommends the following:
On each affected ESXi host, add the following line in the /etc/vmware/config file:
cpuid.7.edx = "----:00--:----:----:----:----:----:----"
This will hide the speculative-execution control mechanism for virtual machines which are power-cycled afterwards on the ESXi host.
This line will need to be removed after applying a future fixed microcode from Intel in order to enable the full guest OS mitigations for CVE-2017-5715.
When convenient, power-cycle virtual machines on the affected ESXi hosts; rebooting of the ESXi host is not required.
Stateless vSphere ESXi Hosts using ESXi 5.5 or 6.0, this line must be re-applied every time the ESXi host reboots. VMware is investigating other options at this time.
Note: For servers using unaffected processors which have applied either the VMSA-2018-0002 or ESXi patches ESXi650-201801402-BG, ESXi600-201801402-BG or, ESXi550-201801401-BG, no action is required.

The effect of these recommendations for an affected ESXi host is that the speculative execution control mechanism is no longer available to virtual machines even if the server firmware provides the same microcode independently. (For customers who have applied the same microcode updates from their server vendor’s Firmware/BIOS, this recommendation may remove the need to downgrade the firmware. Consult your server vendor directly for guidance.)

VMware is working closely with Intel and the industry to come to a quick resolution of this Intel microcode issue and provide an update to our customers as soon as possible.

Colostomy Bag
Jan 11, 2016

:lesnick: C-Bangin' it :lesnick:

Dick Trauma posted:

The CEO has discovered that our Glassdoor page has one review, a very negative one from someone the company hosed over. He emailed general counsel, the COO and myself asking how he can get the review removed, if there's legal action we can take against the former employee, or if (like at the Tony job) we can oblige all of our employees to write a favorable review.

I hate these loving people. They're all the same.

Yeah, there isn't nothing quite like working for a CEO like that. Let me guess, you are on the beck and call for all the CEO's needs and him/her goes directly to you side-stepping your immediate boss. Scalar principle be damned, because why does it matter since your boss was probably hired by the CEO and are neighbors and are best buds.

jaegerx
Sep 10, 2012

Maybe this post will get me on your ignore list!


Colostomy Bag posted:

Yeah, there isn't nothing quite like working for a CEO like that. Let me guess, you are on the beck and call for all the CEO's needs and him/her goes directly to you side-stepping your immediate boss. Scalar principle be damned, because why does it matter since your boss was probably hired by the CEO and are neighbors and are best buds.

Oh you’re new. Dick trauma is basically the bitch of all jobs. His name is basically his life.

kensei
Dec 27, 2007

He has come home, where he belongs. The Ancient Mariner returns to lead his first team to glory, forever and ever. Amen!


Grassy Knowles posted:

Intel Sightings in ESXi Bundled Microcode Patches for VMSA-2018-0004 (52345)
Document Id
52345
Purpose
Although VMware strongly recommends that customers obtain microcode patches through their hardware vendor, as an aid to customers, VMware also included the initial microcode patches in ESXi650-201801402-BG, ESXi600-201801402-BG, and ESXi550-201801401-BG. Intel has notified VMware of recent sightings that may affect some of the initial microcode patches that provide the speculative execution control mechanism for a number of Intel Haswell and Broadwell processors. The issue can occur when the speculative execution control is actually used within a virtual machine by a patched OS. At this point, it has been recommended that VMware remove exposure of the speculative-execution mechanism to virtual machines on ESXi hosts using the affected Intel processors until Intel provides new microcode at a later date.
Resolution
Note: All the patches associated with VMSA-2018-0004 have been pulled back from the online and offline portal.
VUM Customer who has already downloaded the patches associated with VMSA-2018-0004 would continue to persist in the VUM depot even after the EP is rolled-back. But, if customer tries to remediate the corresponding patch baseline created against the bulletins of these patches, following error would be encountered - "Cannot download software packages from patch source".
For Customers who have configured UMDS for offline patching, the patches associated with VMSA-2018-0004 continue to persist in the UMDS depot directory even after roll-back and can be patched successfully from the same. It is recommended that such customers manually remove the binaries/VIBs from the UMDS directory or direct the downloads to the new UMDS directory location to be in-sync with VMware’s online depot. For more information see How to configure the UMDs download location.
Customers who use Stateless boot through Autodeploy will have to update the existing rule to point to the image profile associated with VMSA-2018-0002 instead. If you continue without updating rule, the Autodeploy would stateless boot into the image associated with VMSA-2018-0004 which is not intended.
For ESXi hosts that have not yet applied one of the following patches ESXi650-201801402-BG, ESXi600-201801402-BG, or ESXi550-201801401-BG, VMware recommends not doing so at this time. It is recommended to apply the patches listed in VMSA-2018-0002 instead.

For servers using the Intel Haswell and Broadwell processors (see Table 1 for the specific list of affected VMware vSphere supported Intel Haswell and Broadwell processors) that have applied ESXi650-201801402-BG, ESXi600-201801402-BG, or ESXi550-201801401-BG VMware recommends the following:
On each affected ESXi host, add the following line in the /etc/vmware/config file:
cpuid.7.edx = "----:00--:----:----:----:----:----:----"
This will hide the speculative-execution control mechanism for virtual machines which are power-cycled afterwards on the ESXi host.
This line will need to be removed after applying a future fixed microcode from Intel in order to enable the full guest OS mitigations for CVE-2017-5715.
When convenient, power-cycle virtual machines on the affected ESXi hosts; rebooting of the ESXi host is not required.
Stateless vSphere ESXi Hosts using ESXi 5.5 or 6.0, this line must be re-applied every time the ESXi host reboots. VMware is investigating other options at this time.
Note: For servers using unaffected processors which have applied either the VMSA-2018-0002 or ESXi patches ESXi650-201801402-BG, ESXi600-201801402-BG or, ESXi550-201801401-BG, no action is required.

The effect of these recommendations for an affected ESXi host is that the speculative execution control mechanism is no longer available to virtual machines even if the server firmware provides the same microcode independently. (For customers who have applied the same microcode updates from their server vendor’s Firmware/BIOS, this recommendation may remove the need to downgrade the firmware. Consult your server vendor directly for guidance.)

VMware is working closely with Intel and the industry to come to a quick resolution of this Intel microcode issue and provide an update to our customers as soon as possible.

Thanks!

MC Fruit Stripe
Nov 26, 2002

around and around we go
Assuming YOLOsubmarine even lives through the night after that Saints game, thanks for the heads up on the patch notes.

Kashuno
Oct 9, 2012

Where the hell is my SWORD?
Grimey Drawer

Dick Trauma posted:

The CEO has discovered that our Glassdoor page has one review, a very negative one from someone the company hosed over. He emailed general counsel, the COO and myself asking how he can get the review removed, if there's legal action we can take against the former employee, or if (like at the Tony job) we can oblige all of our employees to write a favorable review.

I hate these loving people. They're all the same.

Next will be they pay all their employees $10 to leave a positive review

Collateral Damage
Jun 13, 2009

Kashuno posted:

Next will be they pay all their employees $10 to leave a positive review or get fired.

Sefal
Nov 8, 2011
Fun Shoe
Every employee is assigned a security badge, so you can enter the office. The database for this was never updated.(go figure) So my boss is now sitting at the reception desk with his laptop. Monitoring who enters with the badge so he can update the database and find out who came in the office during off hours. All to find the person who installed bitcoin miners.
He now finished that and wants to interrogate employees who were at the office during off hours.

Sadly, I don't know how I can help with finding the person who installed the miners. The person used the local admin account on the public pc's.

Collateral Damage
Jun 13, 2009

Just have an interview with everyone and find out their opinion about "future opportunities of cryptocurrencies". When you find the most enthusiastic one you've found your culprit.

The Iron Rose
May 12, 2012

:minnie: Cat Army :minnie:

Sefal posted:

Every employee is assigned a security badge, so you can enter the office. The database for this was never updated.(go figure) So my boss is now sitting at the reception desk with his laptop. Monitoring who enters with the badge so he can update the database and find out who came in the office during off hours. All to find the person who installed bitcoin miners.
He now finished that and wants to interrogate employees who were at the office during off hours.

Sadly, I don't know how I can help with finding the person who installed the miners. The person used the local admin account on the public pc's.

Why do public PCs have local admin access?

Sefal
Nov 8, 2011
Fun Shoe

The Iron Rose posted:

Why do public PCs have local admin access?

Very good question.
I wondered the same thing when I joined this place. At the very least, My boss has finally started to listen to me and let me revoke admin privileges on them

Judge Schnoopy
Nov 2, 2005

dont even TRY it, pal

Sefal posted:

Every employee is assigned a security badge, so you can enter the office. The database for this was never updated.(go figure) So my boss is now sitting at the reception desk with his laptop. Monitoring who enters with the badge so he can update the database and find out who came in the office during off hours. All to find the person who installed bitcoin miners.
He now finished that and wants to interrogate employees who were at the office during off hours.

Sadly, I don't know how I can help with finding the person who installed the miners. The person used the local admin account on the public pc's.

You have a pc and a time it was installed. You don't have authorization because it was a shared admin account and you don't have identification because you weren't tracking employee badges at the door.

You essentially have nothing and can't possibly take action against anyone even if you're really really really sure you know who it was. The best you can do is shore up your security methods and know you'll catch them if they try again.

Thanks Ants
May 21, 2004

#essereFerrari


The Iron Rose posted:

Why do public PCs have local admin access?

An application was playing up so 'Everyone' was added to 'Domain Administrators' and it fixed it.

Sefal
Nov 8, 2011
Fun Shoe

Judge Schnoopy posted:

You have a pc and a time it was installed. You don't have authorization because it was a shared admin account and you don't have identification because you weren't tracking employee badges at the door.

You essentially have nothing and can't possibly take action against anyone even if you're really really really sure you know who it was. The best you can do is shore up your security methods and know you'll catch them if they try again.

Yeah. I figured as much. This is what we are doing now. This event really shook my boss up.
Boss: "I expect the people who are working here to be adults, But i'm dealing with children"

I'm just glad it wasn't a crypto virus that got us. Now we can actually up our security.

The Iron Rose
May 12, 2012

:minnie: Cat Army :minnie:

Thanks Ants posted:

An application was playing up so 'Everyone' was added to 'Domain Administrators' and it fixed it.

To oh hey. So welcome to the recommended advice on stack exchange, pretty much all the normal sites... Troubleshooting a SCCM permissions thing, turns out you need to explicitly grant server$ full control over your OSD share or you'll get unhelpful errors. Except standard advice to fix it is "oh just give everyone full control over the share for the duration of task sequence creation and swap it back after" :v:

adorai
Nov 2, 2002

10/27/04 Never forget
Grimey Drawer

Sefal posted:

Every employee is assigned a security badge, so you can enter the office. The database for this was never updated.(go figure) So my boss is now sitting at the reception desk with his laptop. Monitoring who enters with the badge so he can update the database and find out who came in the office during off hours. All to find the person who installed bitcoin miners.
He now finished that and wants to interrogate employees who were at the office during off hours.

Sadly, I don't know how I can help with finding the person who installed the miners. The person used the local admin account on the public pc's.
email to all: we are looking at opportunities to invest in cryptocurrency and are looking for a SME.

Use that pool of volunteers to narrow your suspect list further.

Dick Trauma
Nov 30, 2007

God damn it, you've got to be kind.
Just send out an all staff email insisting that cryptocurrencies are dumb and over and see who jumps in to defend them.

Internet Explorer
Jun 1, 2005





Sefal posted:

Yeah. I figured as much. This is what we are doing now. This event really shook my boss up.
Boss: "I expect the people who are working here to be adults, But i'm dealing with children"

I'm just glad it wasn't a crypto virus that got us. Now we can actually up our security.

Sounds like your boss is the loving child.

MC Fruit Stripe
Nov 26, 2002

around and around we go
Sorry, why?

Sickening
Jul 16, 2007

Black summer was the best summer.

Internet Explorer posted:

Sounds like your boss is the loving child.



Yeah I am lost too.

Sefal
Nov 8, 2011
Fun Shoe
I like my boss. As a person, he's ok. It's just that I've been fighting him for over a year on changing our security policies. Local admin being the biggest one. It really is a blessing that it was just miners.
I hope I can finally get it through his head. That whether or not he's dealing with adults or children, an unsuspecting user with no malice in mind can get his pc crypto infected and have it spread easily with the local admin stuff.

lampey
Mar 27, 2012

There is malware that mines bitcoin only outside of office hours to avoid detection. It is more likely malware than an employee bitcoin mining on a work computer

Internet Explorer
Jun 1, 2005






For the same reason that the CEO trying to put the genie back in the bottle on Glassdoor is a loving child for trying to sweep the real problem under the rug by forcing employees to do a positive review, threatening legal action, etc., instead of properly doing his job and improving the company organically.

From the sound of it, this boss was constantly in the way when employees underneath him were trying to actually fix the problem. Now he's incompetently flailing around trying to "fix" the problem. What really rubbed me the wrong way was the "I expect the people who are working here to be adults, But i'm dealing with children" comment. No, you're working with people and people do stupid poo poo. Part of your job is to make sure that they can't do that stupid poo poo, whether it's on purpose or on accident. He's being the childish one if he thinks that's how he thinks the world works, that's how he thinks IT works, and it's made even worse because it is forcing people under him to do a poo poo job.

Sitting at the receptionist desk with his laptop? "Interviewing" employees? What an embarrassment.

CLAM DOWN
Feb 13, 2007




Sefal posted:

I like my boss. As a person, he's ok. It's just that I've been fighting him for over a year on changing our security policies. Local admin being the biggest one. It really is a blessing that it was just miners.
I hope I can finally get it through his head. That whether or not he's dealing with adults or children, an unsuspecting user with no malice in mind can get his pc crypto infected and have it spread easily with the local admin stuff.

Application whitelisting. loving do it.

Adbot
ADBOT LOVES YOU

YOLOsubmarine
Oct 19, 2004

When asked which Pokemon he evolved into, Kamara pauses.

"Motherfucking, what's that big dragon shit? That orange motherfucker. Charizard."

MC Fruit Stripe posted:

Assuming YOLOsubmarine even lives through the night after that Saints game, thanks for the heads up on the patch notes.

It was far too funny an ending to get too broken up about, but thank you for the kind words in this trying time.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply