Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
Powered Descent
Jul 13, 2008

We haven't had that spirit here since 1969.

orange juche posted:

This is why our helpdesk forbids our techs from remoting in to users home pc's while they're on WFH. Company PCs are ok, but there's not enough issuable laptops from our device guys for everyone so some folks are on home PCs with all the associated problems and privacy concerns.

Personal devices for company stuff, that can be a minefield.

Some years ago I was the lone techie for a company full of salespeople, most of whom didn't merit a company-provided machine and so brought in their own laptop, which was usually just their daily driver full of all their personal stuff. So whenever we got a new employee, I would always bend over backwards to show them the limits of my access to their stuff.

I would install the company things like the main app we used and the VPN client and the fileshares (all of which could be an adventure all by itself, given the state some of these machines were in), and then I'd demonstrate how I could take over their screen for tech support purposes. And then I'd show them that that would only work if the VNC server program had been started (and the VPN too of course, if they were out of the office). They shouldn't ever need to run the VNC app unless they were on the phone with me and I asked them to fire it up to let me remote in. I always showed them the error I would get if I tried to connect when they didn't explicitly open that door for me. The last thing I'd need was for my users to be paranoid I was spying on their personal stuff.

Adbot
ADBOT LOVES YOU

PirateDentist
Mar 28, 2006

Sailing The Seven Seas Searching For Scurvy

We had a brief attempt at users using their own PCs due to covid, but it didn’t last. Our setup was just installing the VMWare client, and support stopped there. Anything wrong with your PC itself was not our issue, and we would not remote to it or allow VPN connections from it directly.

Only a few users left with that now, since back ordered notebooks finally got in to give them a proper company PC.

Dirt Road Junglist
Oct 8, 2010

We will be cruel
And through our cruelty
They will know who we are
Our inventory is strictly controlled and only certified hardware can be imaged. If it’s not imaged by us, it won’t get on the VPN.

So one of our M&As forgets this, orders a palette of unsupported laptops from an unvetted vendor, and then screams at me over the phone because I told her to send them back and talk to asset management.

Weedle
May 31, 2006




i am not looking forward to supporting a bunch of personal laptops when we inevitably have to go remote because our governor thinks covid is a fake idea. i suggested that when we buy the new kid laptops this summer we also buy enough to give one to every teacher who is still using a desktop. didn't happen of course. i'm already getting tickets from teachers wanting to know why their asus laptop from 2008 is so slow when all they have installed on it is chrome and office and mcafee and avast and as few as 7000 pieces of adware

Ham Equity
Apr 16, 2013

The first thing we do, let's kill all the cars.
Grimey Drawer
Maybe I'm being too strict, but I feel like if you can't afford to give your employees the hardware they need to do their job, you can't afford to be running a business. It's such a small expenditure in the grand scheme of things.

GreenNight
Feb 19, 2006
Turning the light on the darkest places, you and I know we got to face this now. We got to face this now.

Thanatosian posted:

Maybe I'm being too strict, but I feel like if you can't afford to give your employees the hardware they need to do their job, you can't afford to be running a business. It's such a small expenditure in the grand scheme of things.

Moving 200+ people from desktops to laptops and docks and poo poo is not a trivial expense.

Soylent Pudding
Jun 22, 2007

We've got people!


Back in high school the county bought every teacher a laptop. Then they worried about theft so they went and bolted every teachers laptop permanently to their classroom desk.

Also I do incident response and it's always a fun cluster when we visit a place with bring your own device, a flat network, and no ability to distinguish asset ownership based on ip address.

RFC2324
Jun 7, 2012

http 418

Thanatosian posted:

Maybe I'm being too strict, but I feel like if you can't afford to give your employees the hardware they need to do their job, you can't afford to be running a business. It's such a small expenditure in the grand scheme of things.

Did you catch the reference to teachers? Its not a business

Kurieg
Jul 19, 2012

RIP Lutri: 5/19/20-4/2/20
:blizz::gamefreak:

Soylent Pudding posted:

Back in high school the county bought every teacher a laptop. Then they worried about theft so they went and bolted every teachers laptop permanently to their classroom desk.

Also I do incident response and it's always a fun cluster when we visit a place with bring your own device, a flat network, and no ability to distinguish asset ownership based on ip address.

You reminded me of a story about a company who asked their facilities team to secure machines to the desk (Like, old ancient desktops, they weren't walking away without someone noticing) and rather than using security straps they just drilled bolts through the case, and the motherboard, and the disk drives.

Soylent Pudding
Jun 22, 2007

We've got people!


Those sound very secure to me and more people should strive to get their computers to that level of security.

SyNack Sassimov
May 4, 2006

Let the robot win.
            --Captain James T. Vader


Soylent Pudding posted:

Those sound very secure to me and more people should strive to get their computers to that level of security.

Can't steal the data if the data's already destroyed!

Weedle
May 31, 2006




Thanatosian posted:

Maybe I'm being too strict, but I feel like if you can't afford to give your employees the hardware they need to do their job, you can't afford to be running a business. It's such a small expenditure in the grand scheme of things.

tell me about it. when teachers are hired they are not told "you must have a pc at home that you can use for work," so we basically have to provide one to anyone who asks anyway, and apparently the principals are telling their teachers that they can "probably" have one. so the end result is the same except this way we're inadequately prepared. i should also point out that we're not talking thinkpad x1s or anything here, these are sub-$400 k-12 laptops with celerons. they're good enough for basic web and office use and that's about it, but they're an improvement on some of the poo poo our teachers are bringing in wanting to use, and most importantly can actually be managed by us

the budgetary priorities in this department are beyond insane. we're spending on poo poo like 3d printers and surface pros while basic needs are neglected. a little while ago i wanted to buy a dozen hdmi cables, because we always need them and never have enough, and my boss' response was "if we had all the money in the world..." like i wanted to redo my office floor in marble or something

Thanks Ants
May 21, 2004

#essereFerrari


Are there any education discounts available to use Windows Virtual Desktop?

SlowBloke
Aug 14, 2017

Thanatosian posted:

Maybe I'm being too strict, but I feel like if you can't afford to give your employees the hardware they need to do their job, you can't afford to be running a business. It's such a small expenditure in the grand scheme of things.

We had to pretty much wipe a whole year worth of budget to convert every desktop user to a laptop and even then it didn't cover all of them, the last batch(that has to include every new planned hire for the next year to avoid logistic issues as a second lockdown is likely to happen) required to move every planned it project back one year or more.

It's not that trivial to spring up possibily several hundred thousand of euros/dollars on a whim.

Arquinsiel
Jun 1, 2006

"There is no such thing as society. There are individual men and women, and there are families. And no government can do anything except through people, and people must look to themselves first."

God Bless Margaret Thatcher
God Bless England
RIP My Iron Lady

Soylent Pudding posted:

Also I do incident response and it's always a fun cluster when we visit a place with bring your own device, a flat network, and no ability to distinguish asset ownership based on ip address.
So.... everywhere? I've been into networks where the whole thing was VLAN'd to gently caress and back with every little thing nicely segregated up, but all of the ACLs had "any any any allow" right at the top, or they had devices with multiple interfaces split between NSGs.

Or both.

Dirt Road Junglist
Oct 8, 2010

We will be cruel
And through our cruelty
They will know who we are

Kurieg posted:

You reminded me of a story about a company who asked their facilities team to secure machines to the desk (Like, old ancient desktops, they weren't walking away without someone noticing) and rather than using security straps they just drilled bolts through the case, and the motherboard, and the disk drives.

When I worked for the SEO fuckwit I refer to as Skippy the Sex Offender, he got a bug up his rear end about physical security and bought lock cables for our laptops. I asked him what he intended to lock them to, since we were working on lightweight IKEA tables that you could push over and then unloop the cable from the table leg.

So he got a drill and a 1” forstner bit and tried to plunge a hole in the table top. Lo and behold, the table is basically two sheets of 1/8” fiber board with a core of shredded paper. The bit chawed a hole in it twice the diameter of the bit itself. Proudly, he looped the cable thru the mess and stood back to admire his work.

I walked over, put one hand on the table, and gave the cable a yank. Ripped it clean through the side of the paperboard. Said, “oops?” and wandered off to do actual work.

He still had that table when I quit.

Proteus Jones
Feb 28, 2013



You should have shown him the three-hole-punch trick. Pretty much guaranteed to remove the lock with (maybe) minor cosmetic damage on the laptop casing.

Really anything you can use as a lever on a non-working key. The side pins on the lock are super weak compared to the plate in the computer.

Agrikk
Oct 17, 2003

Take care with that! We have not fully ascertained its function, and the ticking is accelerating.
Now I want to know the three hole punch trick.

I hope it’s that one weird trick that every it security specialist hates.

Arquinsiel
Jun 1, 2006

"There is no such thing as society. There are individual men and women, and there are families. And no government can do anything except through people, and people must look to themselves first."

God Bless Margaret Thatcher
God Bless England
RIP My Iron Lady
That's the trick where you use paper to open a Kensington lock.

Moo the cow
Apr 30, 2020

Agrikk posted:

Now I want to know the three hole punch trick.
I thought it was a sex term.

RFC2324
Jun 7, 2012

http 418

Moo the cow posted:

I thought it was a sex term.

No, I believe that's called an 'airtight'

Proteus Jones
Feb 28, 2013



Agrikk posted:

Now I want to know the three hole punch trick.

I hope it’s that one weird trick that every it security specialist hates.

Weirdly enough I can't find any vids of this online.

So, pre-reqs:

One of these, locked to computer:



One of these, sitting in an office:



A set of these, that do NOT belong to the lock:



  • Insert non-working key into lock
  • wedge key into three hole punch
  • Use three hole punch as a lever and turn the key.
This will bend or shear the two pins that prevent the little "T" at the end of the lock from rotating, allowing you easily wiggle the lock out of the attachment point on the device. There's no reason you can't use pliers or an adjustable wrench or anything else that will give you sufficient leverage. We just thought it was funnier with a three hole punch when shuttering our Info Sec office here in the US.

You probably don't want to use this where the lock-plate is added via adhesive (or rivets) since you'll likely bust the hell out of the casing of whatever it's attached to. Then you pivot over to the flat-head screwdriver trick, which takes a *little* longer, but works well with these kinds of locks.

Proteus Jones fucked around with this message at 23:27 on Aug 22, 2020

mllaneza
Apr 28, 2007

Veteran, Bermuda Triangle Expeditionary Force, 1993-1952




Dr. Arbitrary posted:

I need to start counting next time I see someone try to copy/paste something into a PuTTY window, but accidentally click and drag when they click into the window, overwriting their clipboard.

Why the gently caress is ctrl-c, ctrl-v so goatfucking foreign to so many terminal developers ?

Methanar
Sep 26, 2013

by the sex ghost

mllaneza posted:

Why the gently caress is ctrl-c, ctrl-v so goatfucking foreign to so many terminal developers ?

https://devblogs.microsoft.com/commandline/windows-command-line-the-evolution-of-the-windows-command-line/

https://devblogs.microsoft.com/commandline/windows-command-line-inside-the-windows-console/
because the windows console is straight up 1980s and every terminal application in windows is a hack that involves screenscaping to paste into an offscreen cmd.exe

Methanar fucked around with this message at 03:10 on Aug 23, 2020

Data Graham
Dec 28, 2009

📈📊🍪😋



Proteus Jones posted:

Weirdly enough I can't find any vids of this online.

So, pre-reqs:

One of these, locked to computer:



One of these, sitting in an office:



A set of these, that do NOT belong to the lock:



  • Insert non-working key into lock
  • wedge key into three hole punch
  • Use three hole punch as a lever and turn the key.
This will bend or shear the two pins that prevent the little "T" at the end of the lock from rotating, allowing you easily wiggle the lock out of the attachment point on the device. There's no reason you can't use pliers or an adjustable wrench or anything else that will give you sufficient leverage. We just thought it was funnier with a three hole punch when shuttering our Info Sec office here in the US.

You probably don't want to use this where the lock-plate is added via adhesive (or rivets) since you'll likely bust the hell out of the casing of whatever it's attached to. Then you pivot over to the flat-head screwdriver trick, which takes a *little* longer, but works well with these kinds of locks.

powerful "measure the length of the shadow of the barometer, compare to the length of the shadow of the building" energy here

The Fool
Oct 16, 2003


mllaneza posted:

Why the gently caress is ctrl-c, ctrl-v so goatfucking foreign to so many terminal developers ?

Ctrl-c is a process escape command
Ctrl-v is for verbatim mode


HTH

RFC2324
Jun 7, 2012

http 418

The Fool posted:

Ctrl-c is a process escape command
Ctrl-v is for verbatim mode


HTH

I like the Konsole solution. They just added shift to all the ctrl modifiers used by the OS, so ctrl-shift-c and ctrl-shift-v.

taqueso
Mar 8, 2004


:911:
:wookie: :thermidor: :wookie:
:dehumanize:

:pirate::hf::tinfoil:

same with kitty

mllaneza
Apr 28, 2007

Veteran, Bermuda Triangle Expeditionary Force, 1993-1952




RFC2324 posted:

I like the Konsole solution. They just added shift to all the ctrl modifiers used by the OS, so ctrl-shift-c and ctrl-shift-v.

I'm mildly reconciled to those.

Data Graham
Dec 28, 2009

📈📊🍪😋



Hell is being forced eternally to watch someone else do sysadmin stuff who doesn't know Unix terminal shortcuts like ^A or ^E or ^U, or does not understand about history scrollback.



*types 300-character command, makes typo at beginning*

*deletes entire 300-character command backspacing one letter at a time*

*Tries to repeat command, has to retype it all again from scratch*

RFC2324
Jun 7, 2012

http 418

Data Graham posted:

Hell is being forced eternally to watch someone else do sysadmin stuff who doesn't know Unix terminal shortcuts like ^A or ^E or ^U, or does not understand about history scrollback.



*types 300-character command, makes typo at beginning*

*deletes entire 300-character command backspacing one letter at a time*

*Tries to repeat command, has to retype it all again from scratch*

I actually don't know these myself because modern terminals usually recognize home and arrow keys, but I know they exist and can look them up when I need them. I don't understand not figuring that out

Powered Descent
Jul 13, 2008

We haven't had that spirit here since 1969.

Speaking of "how do they not KNOW this", this happened just a few weeks ago.

As part of an inventory tracking thing, an admin had to upload a csv file with a few columns of info. So he manually assembled the data (there wasn't very much) in Excel and then exported it as a csv. So far so good. But it seems that when doing the export, Excel had dropped the leading zeros on the column with an ID number. That is, "foo,bar,0000012345" in the original sheet had become "foo,bar,12345" in the exported csv, which would cause the system to spit it back out when uploaded. And at this point he was STUMPED. Note that it was exactly the same number in all the rows, and that the entire file was only six lines long, header row included. After spending who knows how much time googling for Excel options that might fix his problem, he finally appealed for help, at which point the matter came to my attention. Once I picked up my jaw and got done shaking my head, I decided the simplest approach was best and walked him through adding the zeros manually in a text editor. This fixed his problem and he happily uploaded his file.

The kicker: this man is a senior admin on that team. :stare:

Thanks Ants
May 21, 2004

#essereFerrari


I had someone spend weeks back and forth on a ticket where an email address in a signature wasn't automatically appearing as a link, where the quick fix would have been to just wrap some HTML around it, and the actual fix was to realise that the hyphen in the email address was some sort of unicode dash character because it had been copied and pasted out of some marketing material, and just retype the thing.

Dirt Road Junglist
Oct 8, 2010

We will be cruel
And through our cruelty
They will know who we are

Thanks Ants posted:

I had someone spend weeks back and forth on a ticket where an email address in a signature wasn't automatically appearing as a link, where the quick fix would have been to just wrap some HTML around it, and the actual fix was to realise that the hyphen in the email address was some sort of unicode dash character because it had been copied and pasted out of some marketing material, and just retype the thing.

We had a weird issue where our outgoing emails were getting snared by various spam blockers that our clients used...but it wasn’t universal. For a while, it was a big mystery, because it wasn’t a specific department or subset of users who were affected.

Eventually, someone realized it was only people who used the old ASCII email signature template, which had a pastiche of our old logo design with the long-s-for-an-F in the center. The non-alphanumeric character tripped up filters looking for hidden characters that might be used to sneak a V1@GRA past a simple word filter.

If nothing else, it forced people off the old logo a bit quicker.

Knormal
Nov 11, 2001

The Fool posted:

Ctrl-c is a process escape command
Ctrl-v is for verbatim mode


HTH
Yeah, are you too good for the real copy/paste shorcuts?

Impotence
Nov 8, 2010
Lipstick Apathy

Weedle posted:

tell me about it. when teachers are hired they are not told "you must have a pc at home that you can use for work," so we basically have to provide one to anyone who asks anyway, and apparently the principals are telling their teachers that they can "probably" have one. so the end result is the same except this way we're inadequately prepared. i should also point out that we're not talking thinkpad x1s or anything here, these are sub-$400 k-12 laptops with celerons. they're good enough for basic web and office use and that's about it, but they're an improvement on some of the poo poo our teachers are bringing in wanting to use, and most importantly can actually be managed by us

the budgetary priorities in this department are beyond insane. we're spending on poo poo like 3d printers and surface pros while basic needs are neglected. a little while ago i wanted to buy a dozen hdmi cables, because we always need them and never have enough, and my boss' response was "if we had all the money in the world..." like i wanted to redo my office floor in marble or something

<$200 gets you an off-lease corporate i7 thinkpad with a SSD, 8-16GB ram, what the gently caress are they buying?

Sywert of Thieves
Nov 7, 2005

The pirate code is really more of a guideline, than actual rules.

Knormal posted:

Yeah, are you too good for the real copy/paste shorcuts?



Heck yeah, Shift-Insert. At least that works consistently across all my terminals, be they Putty, Git or WSL.

Arquinsiel
Jun 1, 2006

"There is no such thing as society. There are individual men and women, and there are families. And no government can do anything except through people, and people must look to themselves first."

God Bless Margaret Thatcher
God Bless England
RIP My Iron Lady

Proteus Jones posted:

Weirdly enough I can't find any vids of this online.

So, pre-reqs:

One of these, locked to computer:



One of these, sitting in an office:



A set of these, that do NOT belong to the lock:



  • Insert non-working key into lock
  • wedge key into three hole punch
  • Use three hole punch as a lever and turn the key.
This will bend or shear the two pins that prevent the little "T" at the end of the lock from rotating, allowing you easily wiggle the lock out of the attachment point on the device. There's no reason you can't use pliers or an adjustable wrench or anything else that will give you sufficient leverage. We just thought it was funnier with a three hole punch when shuttering our Info Sec office here in the US.

You probably don't want to use this where the lock-plate is added via adhesive (or rivets) since you'll likely bust the hell out of the casing of whatever it's attached to. Then you pivot over to the flat-head screwdriver trick, which takes a *little* longer, but works well with these kinds of locks.
Instead of all that just wrap some printer paper around a bic, slide it off, shove it into the keyhole and wiggle it a bit.

SlowBloke
Aug 14, 2017

Biowarfare posted:

<$200 gets you an off-lease corporate i7 thinkpad with a SSD, 8-16GB ram, what the gently caress are they buying?

Rugged chromebook thinkpads with no fuss warranty. You cannot go on a ebay scavenge hunt for k12 as you will need to constantly replace those.

Adbot
ADBOT LOVES YOU

BlankSystemDaemon
Mar 13, 2009



Data Graham posted:

Hell is being forced eternally to watch someone else do sysadmin stuff who doesn't know Unix terminal shortcuts like ^A or ^E or ^U, or does not understand about history scrollback.
Don't forget about ^xx, for moving between cursor position, first character after the prompt, and back.

  • 1
  • 2
  • 3
  • 4
  • 5