|
AAAAA! Real Muenster posted:Once I hit the reply button to ask, it updated! There are three pages! I wonder why mine wasnt updating when I was spending all that time looking at it... I actually can't tell if you're joking or not here because this is a legitimate known issue that happens on SA
|
# ¿ Jan 2, 2018 18:31 |
|
|
# ¿ May 13, 2024 20:53 |
|
gently caress printers I'm still sometimes tempted to buy a production xerox for my apartment since at least that'll break fewer times and I can actually get support Because goddamn printers are poo poo. I have no idea how something so essential to everyday life is so broken across literally every single vendor.
|
# ¿ Jan 2, 2018 22:21 |
|
Dravs posted:That is why AWS and Microsoft will be so badly impacted because their butt processing is massive. cloud to butt continues to be pay dividends
|
# ¿ Jan 3, 2018 19:24 |
|
minusX posted:Yep that's what I was gonna say. win-x is great on windows 10 for quickly launching admin consoles and completely useless/redundant on Windows 7
|
# ¿ Jan 10, 2018 22:46 |
|
Avenging_Mikon posted:A ticket came in! this is suuuuuuuuuuuuuch a bad idea. So glad we've mostly purged systems who have "Administrator's Macbook Pro" as their localhost names. Now it's all P/M + asset tag + city location. So a PC located in New York would be P002456NYC, whereas a Mac in Toronto would be M000123TOR. Simple, easy, good for braindead management. It used to be first initial+lastname but that a) doesn't work great as you scale up the business and get people with similar names, and b) a localhost name is for the computer, not the user.
|
# ¿ Jan 11, 2018 22:37 |
|
you know it's a fun ticket when you literally have to start citing research papers in your response
|
# ¿ Jan 16, 2018 18:41 |
|
I didn't elaborate as it's wasn't actually that fun other than the fact I had to cite a research paper in the comments . I was analyzing various DNS records/IP logs in response to possible domain fluxing and I had to rely on a study which distinguished between characteristics of legitimate domain names and pseudo-random domain names, that's it. The only funny bit is the actual citation The Iron Rose fucked around with this message at 21:49 on Jan 16, 2018 |
# ¿ Jan 16, 2018 21:35 |
|
The Macaroni posted:I could see my way to a kind of forgiveness if the password were 256 characters long, including dozens of special/numeric characters. But it's always something like Sentinel7. at a certain point I don't understand why enterprises don't use password managers. The one we use in my company is literally free aghhhhhh E: I know that the answer is "lol government IT" but still
|
# ¿ Jan 18, 2018 22:24 |
|
Larches, you're the goon stuck in a well. You're stuck in that well for a lot of good reasons, but stuck you remain.
|
# ¿ Jan 22, 2018 17:18 |
|
Oyster posted:He came back with $2k higher than what the other company was offering (and what he offered this morning) and specific instructions on how to get certs counted as tuition reimbursement. You raise a valid point about future raises and that crossed my mind as well, along with the fact that the other company has set advancements that my current one does not. I have 24 hours yet, and it may come down to if I can get milestones for advancement with my current company that ends with me in an analyst position. Talk to the competitor, say that you'd need their salary to be higher due to your corporation's counter offer. If they cave, great. If they don't, take the counter.
|
# ¿ Jan 25, 2018 02:01 |
|
A ticket came in. Manager wants one of their new employees to have access to some software for reviewing emails, sure, fine, whatever. I work the later shift so I'm the only one in the office, but whatever, I found the logon creds so I'll muddle my way through it. So I go to see what access the other users have so I can grant the appropriate credentials and what do I find? Dozens of people, including former freelancers, with full analytical access to emails across our entire domain including unredacted PII. larchesdanrew posted:Reagan is back, albeit in a far more cartoonish fashion from a guest artist. this is fantastic though. The Iron Rose fucked around with this message at 03:12 on Jan 26, 2018 |
# ¿ Jan 25, 2018 23:58 |
|
guppy posted:We have dealt with complaints like this before. Even if it were feasible, interfering with a wi-fi network not your own is an FCC violation. Telling them that it's illegal is generally enough to get them off your back. It's not an unreasonable request. What if vendors or clients see that? Not a good look. There's no real way to solve that though. You could probably stay in compliance if you did it only on employee hardware, which doesn't solve the problem. And that's if it's even possible to hide a SSID in that way.
|
# ¿ Jan 27, 2018 12:51 |
|
wolrah posted:It is an unreasonable request though. It's someone outside of the company's control doing something that's completely legal and within their power. There's nothing for anyone at the company to do about it except trying to find the person and politely ask them to change it. If it was a banner hanging in their window no one would consider it reasonable to ask maintenance to prevent it from being seen, how is asking IT to stop an external WiFi signal from appearing any different? Sorry, I should have amended that. It's a reasonable request for HR, who knows gently caress all about how computers or wifi networks work, to make. It's obviously unfeasible and unreasonable, if not actively impossible, to do anything about. But it's not a ridiculous request to make if you don't know anything about computers.
|
# ¿ Jan 27, 2018 19:55 |
|
RedMagus posted:Today in "Why you should check your software patches on a test domain before rollout": ...how the hell did that even happen? More to the point, SCCM will absolutely reinstall it, depending on how the update was rolled out. But unless the deployment has been removed from the device collection, it's just going to keep reinstalling on every machine.
|
# ¿ Jan 29, 2018 17:38 |
|
fishmech posted:The girl they tried to kill survived. Still hosed up, but at least nobody actually died. I actually didn't know that and it makes it significantly better Still horrible of course
|
# ¿ Feb 10, 2018 17:54 |
|
yeah i'm 100% okay with giving finance and accounting overpowered laptops so they can brute force their way through pivot tables rather than calling us in
|
# ¿ Feb 12, 2018 16:58 |
|
Garrand posted:Wait, really? That's a thing now? Because when I hear "cyber" the first thing I think of is 2000 era chat rooms and hot singles in my area. the amount of family members who think I do "cybersecurity" is staggering like i investigate endpoints guys. calling that cybersec is ridiculous
|
# ¿ Feb 14, 2018 16:37 |
|
Kurieg posted:I picked up the first season of CSI:Cyber super cheap and was watching it just to laugh at everything that was so hilariously wrong. My favorite was their visual depiction of tracking traffic through the deep web as if the deep web were a physical place below the internet, indicated by big scary red glowing letters that said DEEP WEB. So darktrace decided to go full bore on the CYBER GRAPHICS poo poo and it's incredibly infurating to use this slow as hell web service that's running a ridiculously fancy and ridiculously useless topology in the background. My dude. If I'm analyzing DNS logs seeing some fancy CSI crap is exactly what I don't want or need.
|
# ¿ Feb 14, 2018 21:16 |
|
It's the fact that it spoils Season 1 of Mr. Robot.
|
# ¿ Feb 15, 2018 16:45 |
|
Kurieg posted:Hey if you guys need to convince your bosses to not use Apples in a work environment, Any program can take a screenshot of your entire desktop at any time and run it through an OCR If someone wants to use a program installed on your computer maliciously you're essentially hosed anyways. The fact that it's easy to program doesn't really change the threat model, since if you're at the point where malicious software is installed as a program on an endpoint then it's compromised anyways. Proper remediation for this is software restriction policies and removing local administrator from your users.
|
# ¿ Feb 15, 2018 17:56 |
|
ElehemEare posted:L O L if you work in IT and you haven’t met the cleaning staff coming through after 7pm, I envy you. My partner just poo poo talks her racist old boss in Spanish with the cleaning staff and apparently it's great I mostly just get looks of muted sympathy on the rare occasions I'm working after the lights turn off
|
# ¿ Feb 21, 2018 22:49 |
|
so i'm pretty sure that if a computer has lost its trust relationship with the dc and the local admin account is disabled, i'm just entirely hosed, right? It's a surface book so I can't even rip the drive
|
# ¿ Mar 8, 2018 00:39 |
|
Varkk posted:Pull it off the network and log in with a cached domain account. Then you can repair the trust relationship. Assuming the cached account has admin privileges. this might be the first time in my career so far I've seen an entirely legitimate reason why you'd need a user's domain password all this time i've been telling folks "hey we'll never ask for your password, if we need access for reasons we can always reset poo poo, never tell anyone your password" in the vain hope of stopping people from loudly volunteering their system password for all to hear.
|
# ¿ Mar 8, 2018 00:51 |
|
Turns out it has bitlocker (good), but it also turns out the recovery key wasn't saved like it should have been so ¯\_(ツ)_/¯ I'll try the cached domain account first, but thank you for all those wonderfully fun ideas! This is much more exciting now.
|
# ¿ Mar 8, 2018 03:26 |
|
Kurieg posted:https://thehustle.co/european-clocks-serbian-power-grid/ 6 minutes eh Clearly someone in Kosovo really hates kerberos
|
# ¿ Mar 13, 2018 22:52 |
|
Weedle posted:It has been decreed that instead of earmarking a portion of the operations budget for network infrastructure, all funding for that will now come from the school’s yearly fundraising auction. Makes sense.
|
# ¿ Apr 9, 2018 21:44 |
|
MF_James posted:That reminds me of a job interview I was on a few weeks ago, I talk to the IT director about their environment and their practices "Oh yeah we have pre-prod environment, dev environment, QA environment" etc etc. Then he brought in a DBA to ask me some questions and walked out of the room, at some point I asked him about how they do testing etc before rolling out software updates "Oh yeah that's kind of a shitshow, we test a lot in production, we don't really have a QA environment and none of the guys actually writing code know how to manipulate a DB properly so I'm constantly putting out fires when they push new code" ... one of these things is not like the other That's pretty shockingly honest, jesus. It must really be a dumpster fire if he warned you in the interview.
|
# ¿ Apr 12, 2018 00:03 |
|
Hungry Computer posted:It would help if vendors stopped listing ridiculous minimum or recommended requirements. Just look at these for SCCM: SCCM is a beast that will happily use as much RAM as you give it, but <10000 endpoints and you can make do just fine with 32 or 64 gb of RAM on your CAS with the sql database installed locally. That being said sccm is also the weird beast where things will just fail in weird and unexpected ways and giving it more RAM will definitely ease the load on your poor SCCM admins.
|
# ¿ May 4, 2018 20:58 |
|
Apex Rogers posted:Instead of disabling avatars, I use Decreased Productivity. It ghosts all images/videos so you can mouseover to see them, but leaves them as greyed-out versions by default. You can still see the outline of an avatar, but it's pretty much invisible to someone behind you or walking by. this is pretty cool and seeing avs is trippy after like 6 months without them but man it does not play nice with salr
|
# ¿ May 25, 2018 21:39 |
|
Thanks Ants posted:Yeah it's called you pretty much need a dedicated resource to run it though. This will take a significant amount of time to configure, set up, and administer. Pro tip - make hella use out of that support contract. Their support staff tend to be both knowledgeable and very responsive.
|
# ¿ May 30, 2018 18:43 |
|
A ticket came in: someone on our recruiting team's desk phone wasn't getting a network link! So I saunter on over to the recruiting den and what lo and behold, it indeed can't access the network. Phone looks fine, so I trace the cables and find that it's plugged into a dinky little desktop switch. That, in turn, is plugged into a $3,000 48 port managed Cisco switch, which powers the other three other desk phones and literally nothing else. It ended up just being a bad cable from the Cisco switch to the lovely desktop switch but who in their right loving mind thought that this was a good networking setup it was my boss
|
# ¿ Jun 26, 2018 19:04 |
|
Zero VGS posted:OK, CEO of the company is pissed because our cloud-based embedded Win10 Pro digital signage occasionally pops up Windows Update things in the middle of the screen. We had a similar problem at our old company - we used Intel PC sticks for in-office digital signage and patching them was a biiiiiiiiiiiitch. the correct answer - and the one we ended up going with - was to figure out a way to patch the machines properly. Even if they are only connecting to the internet for digital signage updates, that's still connecting to one of your corporate networks and whether it is segmented off into its own purgatory or not, denying updates is only going to come back to bite you later on. Set up WSUS or SCCM, define your maintenance windows for out-of-hours, test your solution, and make sure it works. Or get something like a Chromebit or AirTame or one of the other digital signage vendors out there that let you do something similar without the overhead of a full windows OS which is really the best option if you can spring for the money.
|
# ¿ Jul 20, 2018 19:00 |
|
Which brings us to the broader question, why would anyone use the app instead of a mobile chrome browser...
|
# ¿ Aug 5, 2018 16:38 |
|
Nord VPN is fine. It's cheap, it works, and it's based in Panema. Not sure what else you'd really want?
|
# ¿ Aug 25, 2018 16:18 |
|
nexxai posted:Ok I've had it up to my loving eyeballs with the complete shitshow that is MaaS360 MDM and need a replacement. I don't need anything fancy - the ability to lock down the iPad so users can't install apps, the ability to push apps to a group of iPads, the ability to "design" a home screen (our users are roughnecks in the field and the simpler we can make things for them, the better) and the ability to use non-DEP-purchased iPads if necessary using Apple Configurator. One nice to have would be an interface that was designed after the year 2000. JAMF, if and only if you're willing to have someone whose primary job is to manage JAMF. A simple solution it is not. It took us about 8 months to roll JAMF out to iPads to manage digital signage and we proceeded to screw up signage for our entire company for about two weeks once we started managing them. now, iPads are a terrible choice for digital signage to begin with, but my point is that you need to be careful because it's easier than you think to screw things up.
|
# ¿ Sep 27, 2018 15:22 |
|
Renegret posted:It gets me stuck in a loop where I just smash yes on everything, then I don't notice when it says something different. i don't understand people who just mash OK on computer popups like i literally watch it happen in front of me, or people who ask me if it's OK to click next on a screen where the only options are next and cancel... I genuinely don't understand how they're not even bothering to read what their computer is desperately flashing in their faces.
|
# ¿ Oct 11, 2018 17:14 |
|
Antioch posted:One of the best parts of my new job is being able to fix things like this. SQL server running low on space? Prop it up with an extra 100gb, that's what the SAN is for. sounds exactly like my current workplace. Not five minutes ago I just sent off an email to apply for a Zones of Trust "Deviation" allowance which might be the most dramatic way possible to frame a firewall rule. SLA on reviewing the request before a decision is 2 weeks. The ticket is a month and a half old at this point.
|
# ¿ Nov 22, 2018 20:56 |
|
Renegret posted:
nah I pretty shamelessly give preferential treatment to AVPs and up because a) they have more important things to do with their time than wait on hold with the helpdesk and b) it means I build a relationship and positive facetime. It's precisely because of that personalized and preferential treatment that my department is getting additional oversight and permission to actually administer our domain. That will cut down the time it takes to process newhires from 3 weeks down to 1, and eliminate delays on ~30% of our ticket count where it takes 5 to 10 days to add someone to a drat security group. Also it means I can get internal promotions and title bumps easier, my company gets a better contracting rate at the next renegotiation period, and the CEO gets to do the work he needs to do. Standing on some moral high ground doesn't do anyone any favours.
|
# ¿ Dec 5, 2018 04:45 |
|
Ok that one is pretty annoying yeah. I’d be salty too.
|
# ¿ Dec 7, 2018 16:56 |
|
|
# ¿ May 13, 2024 20:53 |
|
kensei posted:This is my wall paper for my desktop at work. I am in charge of our DNS and SSL. Same and it's a big hit. A+ wallpaper
|
# ¿ Dec 17, 2018 23:21 |