I had a user trying and failing to log in with a new account while using CAPS LOCK. I pointed this out but she was sure (all) computers didn't care about this.
Posts by vulture65537
110 publicly visible posts • joined 3 Jan 2019
Blustering Blackbeard's PC was all at sea, sysadmin got him shipshape in seconds
Linus Torvalds and friends tell The Reg how Linux solo act became a global jam session
UK.gov launches cyber 'lockdown' campaign as 80% of orgs still leave door open
Final step to put new website into production deleted it instead
Patch or perish: Vulnerability exploits now dominate intrusions
Re: Phishing attack - how to help take down
Somewhere around 20 years ago there were 2 phish reporting sites (not gov) and I provided input to them.
I then rigged my MTA to send wrongly addressed mail (luser_relay feature) into a program that checked for links where the visible link and the real link were both https?: but they were not the same. Those got sent to the phish report sites. I then went out to work.
12 hours later I had 16000 recognised phishes and because I put no rate limit on my program the reporting sites blocked me.
AWS's inevitable destiny: becoming the next Lumen
Bank of England: Financial sector failing to implement basic cybersecurity controls
Boffins probe commercial AI models, find an entire Harry Potter book
User insisted their screen was blank, until admitting it wasn't
Re: Go, Look, See
Anderson's rewriting of atomic physics makes positive and negative charges into forward and backward.
"Poul Anderson's "Uncleftish Beholding" is a famous essay explaining atomic theory using a deliberately simplified, Germanic-rooted English, avoiding Latin/Greek words like "atom," instead coining "uncleft" (un-cleft/undivided) and "uncleftish" (atomic), demonstrating linguistic purism and showing how science might have ..."
I had someone tell me the message on the screen as a series of LETTERS rather than words. As soon as a computer was involved he lost the ability to read.
I've also seen a screen with brightness all the way down.
And (this one puzzled me for a minute) the computer has 2 video outlets and meaningful results require plugging into the right one.
I was a part-time DBA. After this failover foul-up, they hired a full-time DBA
Minority Report: Now with more spreadsheets and guesswork
Re: Unintended consequences
Imagine if the map didn't get updated for two weeks so Plod phones the IT company and it turns out an rsync job has got stuck so no new data got delivered. There was a lock preventing two attempts at the same time
The rsync job was wrapped in a timer of a few hours to enforce complete or quit.
Prohibition never works, but that didn't stop the UK's Online Safety Act
Tech support team won pay rise for teaching customers how to RTFM
Security pros are drowning in threat-intel data and it's making everything more dangerous
There's some truth in that. There are also poor configurations and poor understanding of what people use.
And there's a whole lot of attitude around "there can't be any security problem with our work and if anybody says there is we will reject their ideas". Security staff are wasting their time in an organisation that won't fix anything .
Junior sysadmin’s first lines of code set off alarms. His next lot crashed the company
Re: sysadmin ... become a developer
Aren't the most useful details of a printer where it is and what kind it is?
I've been asked to support a printer by someone who couldn't tell me anything about it at all. I resorted to sending test print jobs to the printers I could reach online asking whoever found them to phone me.
Torvalds' typing taste test touches tactile tragedy
IBM scores perfect 10 ... vulnerability in mission-critical OS AIX
Governments can't seem to stop asking for secret backdoors
One stupid keystroke exposed sysadmin to inappropriate information he could not unsee
Backup software vendor Veeam deleted forum data after restoration SNAFU
I was told to make backups, not test them. Why does that make you look so worried?
Abandoned AWS S3 buckets can be reused in supply-chain attacks that would make SolarWinds look 'insignificant'
Brackets go there? Oops. That’s not where I used them and now things are broken
Abstract, theoretical computing qualifications are turning teens off
US Army turns to 'Scylla' AI to protect depot
Wanted. Top infosec pros willing to defend Britain on shabby salaries
Revamped UK cybersecurity bill couldn't come soon enough, but details are patchy
systemd 256.1: Now slightly less likely to delete /home
'Little weirdo' shoulder surfer teaches UK cabinet minister a lesson in cybersecurity
Bad vibrations left techie shaken up during overnight database rebuild
Three-year-old Apache Flink flaw under active attack
Managers are divided between those who refuse to believe a bug exists even when it was discovered years earlier by a member of their own team - that the manager has spoken to but insists that he knows better than technical staff
Or the kind that believes bug reports such as red hat rpc still contains a flaw fixed in 1998 just because the version number shown over the network is still 1.2 .
Neither one is curious enough to ask about the truth or be any more satisfied with better conditions than you get by doing nothing. This ensures that nothing will be done except useless things because something must be done
These are real examples from work and people with names omitted.