Re: Personal heaters
Need... more... details!
181 posts • joined 6 Apr 2012
Sat in a meeting, phone rings: account manager with a seriously over-inflated sense of self-importance, demanding to know why I was not in his meeting. Explained I was in another meeting. Not good enough. cue a tirade to the effect I had 5 minutes to be there, or I'd be sacked. Unable to get a word in, handed phone to my boss... who informed him we were in New York, and could not make a meeting in the UK.
On the subject of work relationships... a few years before I met my future girlfriend doing a weekend Netware server upgrade. She worked in the mid-range team and unexpectedly travelled halfway across England to see what we did. Oddly enough, most people thought we were married , due to having the same surname, and an incident the previous month with a software rollout. But thats another story.
Probably, but "Alan" not so common a name. #
Mark and I were far ahead of the Computer Studies teacher, and were "employed" to type in programs. Used to delight in
10 REM L (SHIFT-L)
which when LIST'ED produced
He never figured it out.
I wrote a kinda clone of the last level of Pheonix in 6502, Mark wrote an awesome "defender" type sideways scroller c/w the scanner.
But that 1982/83 (Mark joined us in the last two years of school). Started in 77/78 on an ICL 2903 minimac at the local Polytechnic, accessed using a teleprinter via acoustic coupler. The school was allocated 32KB of disk space. Being inquisitive, didn't take long to work out how to manipulate DLIST, DLOAD, DSAVE to access other user's partitions, 'acquire' their programs and store mine safely (such that the contents wouldnt show when they did a dir list).
Somehow the Poly admins twigged, but back then this wasn't a bad thing. In exchange for me showing them how to manipulate the disk system, they introduced me to the wonderful world of phone manipulation -helpful as local calls cost something like 5p/min back then, and I was running up some large bills on the schools phone.
"We had them at school. They were great. I taught myself to program them in machine code before the computer course began. The teacher knew less about them than I did, a classmate, Alan, and myself were then duly appointed helpers, when it came to programming and the teacher concentrated on the theory and history sides of computing."
Er, did we go to the same school? Because your first paragraph is my experience, even down to the name.
The memories of SiteGuard in BAOR during th 1980's. A week of being very tired, and very bored.
And astounded as the average US serviceman's inept weapon handling, as characterised by the individual who followed the QRF out with a 66mm AT to the first response position; a narrow sanbagged area just wide enough to squeeze down whilst in CEFO, with a wall behind it....
@Rob Dyke the second you stepped over the line was when you downloaded and stored the repos. Encrypted or not, that was a step too far.
The doubt that is in my mind regarding your motives, is that you have been asked several times /why/ you did this.... and each time you have avoided answering.
Many, many (ok, just over two) decades ago I worked for a major (and I mean major, contributed 2.2% gross gdp to UK economy) UK company, via a outsourcer. This client was the "jewel in the crown" for the outsourcer, and as such the SDM and I were often the subject of attention from senior management. Times were great, the client was awesome to work for, and about a year after starting received a second, and very large, promotion. Things were going swimmingly...
...until the new service delivery manager arrived, complete with a team of four, replacing the old SDM. One of the new arrivals, let us call him Chas, had the same role as me... ooops. So I could have bought a claim for dismissal, but - and bearing in mind that in 1997-99 jobs offers arrived at the rate of 3 per day on a slow day, I made plans to move on. imed to perfection: the weekend I left, client was migrating the entire UK infrastructure from flat TRT to a routed IP network, switched ethernet, etc. The young gent taking over from me was crapping himself. Between him, I, and my oppo on the client side we arranged I would come in on the Monday and Tuesday as a consultant, with a suitable figure daily fee.
Late Tuesday I hand Chas my invoice. His face twitches, then says "ah, but I dont need to pay this. You see, I never processed your resignation letter".
"Tough, I start a new job next Monday" I should add that at this point I still had over 30 days outstanding leave...
Fast forward to the end of the month. Pay slip from the outsourcer. No pay-in-lieu. Invoice unpaid. Call Chas' boss, whom I had a good working relationship with. Who was horrified to learn I had resigned, tries to persuade me back, and on learning 'Chas' was my manager, agrees the screw-up is nothing more sinister than incompetence. Asks me to send invoice.
End result? That months salary kept. Invoice paid following week. Bonus? A further months pay as the resignation didn't 'officially' occur until David received my notice, and thus a further months pay (and pay for two further day's in lieu).
Icing on the cake? Client had 'Chas' removed from the account. I didn't laugh much at all :)
Fancy doing some investigative journalism?
Everyone seems to be accepting the narrative that this was a "sophisticated" attack, carried out by "top tier "nation-state backed" hackers. But no one is questioning that narrative.
Who started that narrative. FireEye. A security company relied on by F100 and Government agencies. Slightly embarrassing for them to be hacked. So its /only natural they put out a statement that they must have been hacked by someone with awesome skillz/.
Except they were not. No one breached FireEyes defences. FireEye imported what used to be called a Trojan. That Trojan than ran, and then the highly patient and careful "hackers" were operating from the inside.
Were did the trojan come from? Solarwinds. So it must have been a "top tier nation state backed..." except the initial compromise wasn't very sophisticated; Solarwinds FTP server had an incredibly weak password; Solarwinds123
The malware itself? Still undergoing analysis, but its "lightweight" (at 400mb!) stealthy, quiet. None of which are exactly beyond the ability of a half decent coder with access to malware source (RATs, Tojans, credential snars, mimikatz-type tools) on the dark net.
FireEye has avested interested in 'hyping' up the 'sophistication' and 'skill level' of the attack/attackers to protect its reputation, and its business. Being breached by a RAT/Trojan, is kinda self-damming. Once upon a time companies used to sheep-dip software before install in a production environment. Indeed, it was best practice. A security company not doing that undermines its own reputation.
And Russia is a convenient target to distract attention away from "we were hacked" to "we were hacked by RUSSIA!!!" and then give the press release an anti-Russian spin, diverting attention away from "we were hacked".
>Ha! The CIO at a job many years ago hired someone he'd met at a bar to be our "documentation >specialist". One day I discovered that our new MS Word "expert" had been manually numbering lists and >pages.
Dark hair? Somewhere around Warrington - Lymm area?
Sounds sooo familiar.
>What the GIS says and what the ground says seldom seems to coincide.
Same NI tour as previous post in thread. We've now moved to Woodburn. Now Woodburne was hugely larger than Kilkeel, at least 8 times the size, holding RUC headquarters, civilian staff, vehicles, heli landing area, and a Marine Commando company. Oh, and us, a section of grungy Sappers. Spend a few weeks digging holes *here* then moving them 3ft to the right *there* because, well, surveyor said so. Digging one trench, by the scoffhouse, we come across a black plastic pipe, maybe 2" diameter.
"Its ok," says Tom the surveyor "its a disused electrical mains conduit. Just cut through it"
Right. Yeah... after the "no utility lines in the area" escapade in Kilkeel, and the resultant case of auto-darwinism-by-electrons, none of us felt inspired enough by the words "disused" and "electrical" in the same sentence to go near the pipe. So the surveyor grabs hold of, and pulls. And pulls, giving it full on 9 Sqn aggression in bagfulls. It isnt enough. Tom takes a light pick to it. I have a photo from above of him just as he touches the piping.
Whoosh and Tom flies backwards, ends up 20ft away. Out of the scoffhouse comes Dave S, the sloppo, food-beater in one hand, "whats happened to me water?"
That 2" pipe was the mains water supply for the entire base... one can only imagine the pressure, enough to propel a large bloke 20ft back.
Tom had pulled
I'll top you all#
A sparky taking out an entire SF base in Kilkeel, Northern Ireland 1986.
Steve D using a light pick (drill hammer) to cut trench run across vehicle hard standing. Tom, the surveyor, assures there are no utility lines in the area.
10 mins later. loud bang. All electrical power to base is lost. Steve is holding the pick, looking a tad shaken; he's just driven the pick through the mains power...
Call out civvy sparkies to fix it. Much work later, Boss sparky reconnects mains line, and power is restored from the sub-station. Junior sparky inside, poking the mains box with one of those cheap screwdrivers that has a bulb inside the handle. Now, I'm no sparky and know little about electrickery, but even I know that's not a good idea
"Mate, you might want to stop doing that, power's back on"
"Oh, O'ill be alroit"
Junior sparky is now lying on the floor 20ft away, left arm very black from hand to shoulder. And is very dead. And the power has dropped. Again.
Race against time now between another sparky, an Act of God, or a PIRA mortar attack.
to the headquarters of a national agency where he was the sole technical support person and tasked with keeping everything ticking over, from Novell servers to those newfangled Windows 95 desktops"
Hang on, a quarter of a century? No, that would mean my first day at Unilever managing Netware 4 boxen and Pentium based disk-less PCs was...
...oh. Yeah. 25 years ago :(
I feel old now.
> I regularly used to run into them still in the late 2000s
I still have one, well, the descendant of the 4ML; a 2100M. Acquired it in 2000, "replaced" it with a 2055DN about 2013, but never quite threw it away; it was just tooo good. Solid, dependable, 600dpi printing. (have a feeling its actually capable of 1200dpi). 10mbit ethernet is just fine for the jobs it does. It doesn't duplex, but that is what the 2055 is for.
Replaced the toner cartridge once. In 20 years.
Upgrade it? It will be left to one of my children, with a condition attached that they are never to dispose of it.
The printer driver, on the other hand. It was awesome, then HP replaced it with a 'universal' which is about as useful as tits on tarzan.
Many moons ago my nickname was "SCSI Al", or more likely "Scuzzy Al". Absolutely loved SCSI, and from 1996 every box I had was SCSI based. Usually based around "God's Own Controller", the Adaptec 2940UW until U160/320 came about (I had one U2 controller, but really skipped that generation), and some form of RAID, be it Compaq SMART-2DH or LSI boards.
*never* had an issue with termination, mixing devices (even 8-bit devices on a 16-bit bus - just install the narrow devices at the end of the chain and use the correct terminator).
The only problem I ever experienced wasn't really SCSI related. Large *cough cough* multinational, migrating from Netware 3 to Netware 4. B and I working late to migrate data from old to new servers. Large company, IT recognised as mission-critical and *no* expense was spared; Compaq shop through and through, mahoosive quad PPro boxes, loads RAM, mirrored RAID5 arrays 5x9GB UW drives (largest capacity one could buy at the time), spare components AND servers in server room "just in case".
Its the last weekend of the project, and we migrating over the main site file-and-print server and backup, which also provided Bindery services for network login. And the darn migration fails. Every. Single. Time. The new server runs out of disk space, despite having a [slightly] larger partition.
Those of you who remember Netware 3 and Netware 4 are nodding in anticipation. NW3 defaulted to a 4KB block size, although 16KB could be specified - but with a large number of small (<16kb) files, or filesize not a multilple of 16, disk space would be wasted. NW4 used a block size dependant on volume size. IIRC we had 32KB blocks, and no sub-block allocation...
An Police Officer acquaintance of mine once had to review the photographs of children found on a laptop, and grade them by severity 1-5. All 45,000 of them. It took him 3 days non-stop work.
Not a job I could do. And most definitely not meet the accused, before or after the court appearance, and not refrain from stabbing the c*** in the face. How he managed not to I will never know.
Total respect to those who work in this field.
Actually, it sounds more like an [outsourced?] helpdesk bod, possibly trained in taking notes but no in-depth security skills, took the call and made the 'decision'.... a 'decision' arrived at by following a script/flow-chart thta led a box marked 'not a flaw'.
Of course, the flowchart was probably designed by a PH clueless mid-level manager wanting to make his mark :)
it would have been 3 external drives; the Amiga could "only" take 4 drives, df0: through df3: so on an A500, one internal drive and three external chained from the rear external drive port.
We'll chalk that up to memory.
What I remember was going to a copy party in Doncaster, and seeing the a HUGE disk copy session; Amiga 1 - 2 over serlink, 2- 3 via parnet 3 - 4 over serlink, 4 -5 over parnet Each Amiga with 2 or more drives, and a copy going from df0: Amiga 1 to df2 or 3 on the end Amiga, and being copied to every drive on the intermediate machines.
Obviously it was a DOS disk (not NDOS), and was being copied to a file and then the file copied from machine to machine. The demo in question was the first a1200 demo, "Red Alert".
NDOS disks, well, XCopy and 4 drives was the limti.
Ah, C64 Turboloaders.... and the lovely flashing horizontal on-screen bars. Bought my first disk drive in 1985, when Debenhams were offering a 1541 and MPS801 printer for £199.99 Only to find the 1541 was slower than a tape turboloader, as the 1541 used a serial bus :(
Until disk turboloaders came out. My personal favourite was The Expert Cartridge. And then there were the parallel interfaces for the 1541, possible because the 1541 was an intelligent drive with its own on-board CPU and 2K RAM, always wanted DolphinDOS or Trilogic's Phantom, but never did get one. Did buy a "DeepScan BurstNibbler" cable, but by that time had replaced my 1541 with a 1541C - and it wasn't compatible :(
The schematics for parallel loaders (Dolphin or DiskDemon) have been available on-line for years, but the sense of nostalgia isn't quite enough to tempt me into buying a C64 and drive...
The same onboard CPU was also at the heart of C64 Fast Hack'em; one of the copiers allowed you to chain two drives together, source disk in one, blank disk in the other, start a copy... and then do something else on the C64. Very novel at the time.
Had a great affecttion for the 1541, a truly great drive let down only by the serial bus. There was an awesome book covering all the different copy protection methods, error 21, 23, 25, 27, fat tracks, long tracks, sync errors etc, beaten only by the Cracker-Jaxx series from Maverick / Hack-U
Personally, I loved the hardware "hacks" for disk drives; Supercard Ami II internal hardware copier for the Amiga, BackupBuddy for the C64, Copy ][ PC for the IBM Still have the Ami II and Copy ][ hardware.... dont ask why, I don't know, cant bear to sell them.
Bought 3 LS Superdisks in 1999, one for me and each of two mates, for copying stuff between each other. They never got fitted, never got used, and I found them in the loft a year ago, complete with a single LS-120 disk. Obsolete because CD-R became affordable in 1996, with the Ricoh CD55 (or was it TEAC?), and then Yamaha's awesome CDR200 and CDR400 drives (superb models, with very moddable firmware).
I know one of my PCs has a disk drive. I have a box of disks somewhere - some old Amiga stuff, some old PC stuff, a Netware licence disk... and thats about tt. Haven't read a disk since, 2012? 2007?
Disk drives. Consigned to nostalgia since 1999.
Hang on, whilst i give them credit for fessing up, i dont recall them fessing uo to overcharging me TWICE what i used for six years. My refund came to about £8. I was using a goodybag worth each mon, and often topping up by a tenner when i exceeded voice mins or data. Over 6 years thats a f@@k load more than eight quid.
Been a customer for years, will continue to do so as im happy, but that leaves a sour taste in the mouth.
Regardless, at least the ICO is starting to impose fines than DO appear on the balance sheet as tangible numbers, not the piddling £10,000 £250,000 fines of the last decade or so, that were nothing more than rounding errors.
And, frankly, Marriot's response is leagues ahead of BA's in terms of admission. BA's was nothing more than and indignant 'harrumpf' and a plaintive "we are unaware of any loss to anyone [so why should we be fined]" bleat.
"Liking to look at naked women is not the same as liking to look at naked women who don't want to be seen naked. In the second case, the one you're on about, it's weird because it's not about seeing boobs, it's aboout controlling the other person. It's the fact they don't want you to see them naked that makes it so exciting to you."
Except you are not looking at a picture of a naked woman who did not want to be seen naked. You are looking at a picture of her face, and a non-existent image representative of a female body. Not *her* body, but a generic body. The "she" is not being seen naked.
That said, I'm not condoning the software (or even the practice of superimposing anyone on another object for the objective of personal gratification), because :creepy. But let's call it out for what it is, than what it isn't.
Ah yes, the user who thinks *his* problem is *your* crisis. As dumb as a cow, as stubborn as a mule, once they get the idea that it is IT related because: <reason>
Has a lot in common with a wife/girlfriend, and acquaintances who think that because you "are in IT" you know all about TV's, A/V kit, ICE, because "its all the same".
Pass me my cattle prod and LART*, I'm going in....
*Luser Attitude Readjustment Tool, aka a pick-handle.
Fag breaks? Mate, you could smoke at the desk.
When booking a meeting room, you could also book tea, coffee, biscuits, and cigarettes. I'd book meeting rooms just to collect 40 cigs, take them downstairs, and throw them at^H^H^H, erm, "distribute them" to the smokers.
Every so often every desk would have a packet of "$company's premium brand" on the desk, or even a carton of 200. Restaurant was subsidised; breakfast cost a maximum of 40p, lunch was wholly free. Bar was subsidised, too.
Unsurprisingly, between the limitless free food, the bar, and the hours, I went from 9 1/2 stone to over 12 stone in 18 months... took some working off. But happy, happy days.
We were doing 80-100hr weeks routinely at a certain large British Tobacco company just over 20 years ago. At the time, it wasn't that strenuous; the work was challenging, but fun, well rewarded, and they had superb management team (ok, 'superb' in the sense of no PHBs, no absurd management decisions, tech decisions left to techs and not over-riden, and a culture of costing the build rather than building to cost).
Despite the hours worked, mistakes were very few and very far between.
The inverse of gaining entry is getting out, I guess. Here's a recent example.
Relocate one site to another. Due to nature of work, Apps team requires a secure office - chip and pin swipe access, barred windows, etc. Two days before the move, one guy from Apps team plus an IT bod pop to get "eyes-on" the new office. IT bod's fob -correctly - cannot gain access to room. Apps guy's fob works, and they can enter the room.
Try to get out - nah-nah, computer says no. Try again, still no joy. Try IT's fob. Nope. Being "new" to the site, they have no contacts, no phone numbers of who to call. Apps dude rings his boss, who rejects the call and follows up with a txt "sorry, in a conf call". Promptly texts back "am locked in the secure room. You've got 5 minutes to find someone to release us or I'm going out the fire exit"
Triggering the fire alarms at this site not just evacuates the building, but triggers a multi-tender response from the emergency services and a very large bill, and a corresponding impact on customer operations - ie, a very expensive proposition - and the Apps dude is known for not bluffing...
As the IT guy retold the story, he sat down and set a timer on his phone to 5mins. Facilities arrived with seconds to spare.
Fob policy was revised so that whilst room entry was on a case-by-case basis, every fob could exit every room.
And what was "Wayne's" manager doing over the next four weeks? Did he not notice the PO for a switch and an OT form cross his desk?
Every time I've run a team or department, I've ensured every single person knows how to say "no" to outside requests, other managers, and if the other person doesn't accept "no", to hang up/walk away with the comment "Please speak to my manager, "shortlegs". It's called 'aircover', because loyalty works both ways and as a manager that is part of the role.
No problems supporting anyone else in the business, just go about requesting it the right way, and I'll make the decision, prioritise the task, and if needed help you budget it ;)
Biting the hand that feeds IT © 1998–2021