|
jana_hus wrote: wanna buy a bridge ?
I have that album
|
|
|
|
|
Where is that confounded bridge!?
"The Crunge" Led Zeppelin, Houses of the Holy. 1973
|
|
|
|
|
Oh yeah ... a good cheesecake is a thing of rare beauty.
"I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
"Common sense is so rare these days, it should be classified as a super power" - Random T-shirt
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
so, a number of my clients allow me to submit IT support requests via email. Since I'm not an employee, I have no access to the employee portal. I'm left to emailing support-asses@yourguess.com. I made that last part up.
me: "Hi, your remote server is not accessible, and I am on a tight deadline. Help."
email: "Opened on your behalf..."
email: "Your incident has been re-assigned..."
Via email, I have no ability to tweak the priority level. Or get any contact. I need to start an IT support company
Charlie Gilley
“They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.” BF, 1759
Has never been more appropriate.
|
|
|
|
|
When looking for IT support software that was on premises and not online, I was amazed how difficult it was to find something that catered for both our support and IT department needs. It seems support and development are different worlds and they have no clue what's happening on the development side or how information should be coupled with e.g. Git or Continous Integration systems.
|
|
|
|
|
tempted to hang a shingle.
"Ancient IT worker, Speaks native American Engrish, $200 per hour, min 1 hour"
"Hello IT support, have you rebooted yet?"
LOL
To err is human to really elephant it up you need a computer
|
|
|
|
|
Context: Merica!!!! where half the people don't pay taxes but can still vote... John, I need you now...
I actually retire in wait... checking... 8 days. I guess I would call my retirement a realignment of nonsense. My entire neighborhood is getting old. We love are homes and our land and are laid waste by GeekSquad and lawn care companies. I plan to pick up some cash...
The good news is that my MIL is legally blind (keeps her off the computer and makes for hilarious interactions with Nigerian or Indian scammers) and my FIL despises and is so luddite on computers it's a crime.
Meanwhile, the remote server seems to work, the corporate IT group are clueless - customer farmed it all out to some Indian group that are totally useless. Read more below. But you corporations that farm your work out... here's your sign: Google[^]
What I have purposed in my heart is elephant it. I worked till 9pm the last job I loved on the last day. Not this time.
Meanwhile, I have no response from IT....
Charlie Gilley
“They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.” BF, 1759
Has never been more appropriate.
|
|
|
|
|
..are you hiring ?
I am fluent in
...it is your fault, you are using it...
...get a new one...
I charge extra for
Did you plug it in ?
then
unplug it , wait 5 minutes and
then
plug it back in
|
|
|
|
|
I'm actually fighting a problem with a piece of commercial software that will go unnamed, but the first letter is Q. Support telling me to reboot after everything they do tells me two things: a) they really don't know what they are doing and b) their code has serious issues (that they ALWAYS blame on others.
The only reason I can think of to require a re-boot is if you are updating a Dll that is in use by the process. Even that is questionable, as the application should release it.
Charlie Gilley
“They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.” BF, 1759
Has never been more appropriate.
|
|
|
|
|
|
hadn't seen that one before.... seriously accurate.
Charlie Gilley
“They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.” BF, 1759
Has never been more appropriate.
|
|
|
|
|
I had some fun with a bit of Microsoft nonsense the other day. I have a rather large hosts file - it's over 600KB. I read something about various devices phoning home to them with every URL visited so I put that address into my hosts file and mapped it to 127.0.0.1. I think it was urs.microsoft.com. Adding that single line to the file triggered the AV program at work and it was deemed to be malicious. At home it triggered a medium level warning when I did a virus scan. I removed that line and it accepted the file with no warnings or notification of any kind.
Apparently Microsoft deems it to be an act of malice to block one of their sites and I think that is nonsense.
"They have a consciousness, they have a life, they have a soul! Damn you! Let the rabbits wear glasses! Save our brothers! Can I get an amen?"
|
|
|
|
|
I need to start a website with advertising....
Charlie Gilley
“They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.” BF, 1759
Has never been more appropriate.
|
|
|
|
|
Maybe you could try setting up a PiHole Pi-hole – Network-wide Ad Blocking, and add the offending address to the blacklist? Or just add the redirect to the hosts file on the system hosting PiHole (PiHole reads the local hosts file and adds entries to it's DNS database)?
There's instructions on how to install PiHole inside a docker instance, if you want to go that route.
Plus, if you can modify your DHCP server to point to the PiHole for DNS, than every system on your local net gets the ad-blocking goodness. Only downside (?) I've encountered is that PiHole does block google ad services, too, so you can't click on any "sponsored" google link, or the "Shopping" links when doing a google search. Which is occasionally annoying. You can find instructions on how to allow ad services through the PiHole, but I think doing so will allow a number of, possibly unwanted, other ad services through as well
"A little song, a little dance, a little seltzer down your pants"
Chuckles the clown
|
|
|
|
|
One type of fishing attack (at one point in time) was to modify your hosts file such that www.realwebsitehere.com redirected to localhost, where the malware had setup a webserver mimicking the real website. Great way to capture logins.
Try 0.0.0.0 instead of 127.0.0.1
|
|
|
|
|
I frequently use the tools in Microsoft's OWN sysinternals toolset for performing various operations on my network, and every time I usually have to hit the notification that pops up and "allow" the program before defender squirrels it away to it's vault of the damned never to be seen again.
However!!! sysinternals is a walk in the park compared to "NirSoft"
NirSoft (https://www.nirsoft.net/) make some absolutely amazing tools, tools that should be in every I.T. engineers bag of tricks when dealing with those folks that forget their passwords and/or routinely screw things up on their windows system, windows defender treats just about every single program in the tool set as malicious.
Not only that, but once over it would list all the offending programs in one go, until folks started clicking on "Allow all", so it now lists every one singly and in such rapid succession that you just do not get time to click on the alert, hoist to admin, select "allow" and save, before that entry is "automatically processed" and your moved on to the next alert.
It appears also that "Allowing" a file now only stays in place for a limited length of time, so after a while the allowance is lifted and you start the dance all over again.
In order for Windows to not destroy my tools collection, I've now started keeping it all on a Linux based SMB share where EVERYTHING is set to read only. Defender goes absolutely nut's when I open that folder now.
|
|
|
|
|
Thirtysome years ago I designed and built cryptographic modules for EFT processing. Early days...
In those days there were two main algorithms for PIN verification.
The IBM Derived PIN system used data from the mag stripe (some of the account number and other fields) to crunch up with DES and other things to generate the expected PIN, which was verified by direct comparison (at a processing system, since the terminal did not have the relevant DES keys etc).
The (more popular) VISA method took the PIN and some stripe data, crunched them up and came out with a 4 digit value which was compared with the PVV (PIN verification value) from the stripe (or issuer's database).
This can be viewed as an elaborate hash function (4 digit PIN -> 4 digit PVV)
I investigated its properties as a hash, and (re-)discovered some interesting statistics.
Obviously a 1:1 mapping could be fairly easily brute-forced, so information is "destroyed" to make it a one-way operation.
As a consequence, looking at the PVV space:
1/e (almost 37%) of PVVs are unreachable - no corresponding PINs
1/e have one PIN mapped to them
1/2e (over 18%) of PVVs have TWO PINs that map to them
1/6e (6%+) of PVVS have THREE PINs that map
1/24e (1.5%+) have FOUR ... and so on
So, (back in PIN space) there is a very real chance that your card has more than one PIN that would work. (Good luck finding the other(s)!)
That fact blew the mind of more than a few bean-counters and auditors....
With regard to OG's thread below, we had requests from card issuing institutions to NOT generate "simple" PINs.
In the end I think we discarded PINs with 4 consecutive digits or more than two repeats.
(A little repetition is good - my favoured PINs have two characteristics:
They can be keyed by laying my hand over the PIN pad and merely flexing fingers.
They include a repeat so even keen watchers wind up missing something.)
Some time later, customer selected PINs (and PIN change terminals) hit the streets...
Ah, nostalgia (ain't what it used to be)!
Software rusts. Simon Stephenson, ca 1994. So does this signature. me, 2012
|
|
|
|
|
Wordle 1,095 5/6*
⬛⬛🟨⬛🟨
⬛🟨🟨⬛🟨
🟨🟨⬛🟨⬛
🟩🟩⬛🟩⬛
🟩🟩🟩🟩🟩
|
|
|
|
|
Wordle 1,095 6/6
⬜⬜⬜⬜🟨
🟨⬜⬜🟨⬜
⬜🟩🟨🟩⬜
⬜🟩⬜🟩🟩
🟩🟩⬜🟩🟩
🟩🟩🟩🟩🟩
|
|
|
|
|
Wordle 1,095 3/6
⬜⬜⬜⬜🟨
🟩🟨🟨⬜⬜
🟩🟩🟩🟩🟩
|
|
|
|
|
Wordle 1,095 3/6*
⬜🟨🟨⬜🟨
⬜🟩⬜🟩🟩
🟩🟩🟩🟩🟩
"I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
"Common sense is so rare these days, it should be classified as a super power" - Random T-shirt
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
🟩🟨⬜⬜🟨
🟩🟩🟩🟩🟩
In a closed society where everybody's guilty, the only crime is getting caught. In a world of thieves, the only final sin is stupidity. - Hunter S Thompson - RIP
|
|
|
|
|
Wordle 1,095 4/6*
⬜⬜⬜⬜🟨
⬜⬜🟨🟩⬜
🟩⬜⬜🟩🟩
🟩🟩🟩🟩🟩
Happiness will never come to those who fail to appreciate what they already have. -Anon
And those who were seen dancing were thought to be insane by those who could not hear the music. -Frederick Nietzsche
|
|
|
|
|
Wordle 1,095 3/6
⬛🟩⬛🟩🟩
⬛🟩⬛🟩🟩
🟩🟩🟩🟩🟩
Ok, I have had my coffee, so you can all come out now!
|
|
|
|
|
American here for context
In the light of recent revelations of MS cooperating with the CCP and the PLA and the fact that the DoD and the Feds (I know that's redundant) moved all their crap to the cloud - all of it classified - none of it protected by the OS, I give you this...
So, I have deliberately covered my built in webcam. I login through a password or a pin. The login process or whatever it is has thrown an exception condition. I cannot login. The mouse has gone stupid. The laptop is hung.
The inmates are in charge of the asylum.
Charlie Gilley
“They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.” BF, 1759
Has never been more appropriate.
|
|
|
|