|
Jochen Arndt wrote: a compressed air powered nail gun somewhere in the work shop.
From personal experience, NEVER let a drunk plumber in the vicinity of one of these.
veni bibi saltavi
|
|
|
|
|
Quote: NEVER let a drunk plumber in the vicinity of one of these.
From personal experience too, craftsmen playing with tools of dissimilar trades are dangerous to your health.
|
|
|
|
|
I think it may be the nail gun that's the problem here.
veni bibi saltavi
|
|
|
|
|
McAfee molests Collies[^].
I can't believe some of the crap they convince corporate IT departments to buy. For example, our hard drives are encrypted using a McAfee product. Guess what happens if you have a motherboard fail, and you need to retrieve the data from the hard drive. You can't decrypt it. The data is completely unrecoverable.
Software Zen: delete this;
|
|
|
|
|
So ... ransomware then?
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
|
|
|
|
|
Hmm. I never made that connection before.
(thinks quietly; just ignore the sound of gear teeth breaking off)
Nah. I don't think McAfee is competent to pull off any kind of extortion scheme. Besides, my wife and I are big fans of the old Perry Mason TV series[^], so I've learned how to counter every blackmail scheme known to man.
Software Zen: delete this;
|
|
|
|
|
Gary Wheeler wrote: I don't think McAfee is competent to pull off any kind of extortion scheme.
Hmmm. I'm pretty sure they are an extortion scheme: have you ever tried to remove their software once installed?
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
|
|
|
|
|
Yes. The uninstall procedure was as follows:
1. Boot from a thumb drive.
2. Security wipe the primary drive.
3. Re-install Windows.
4. Re-install apps.
5. Reload data.
Software Zen: delete this;
|
|
|
|
|
The official method is more fun: How To Uninstall McAfee Antivirus - YouTube[^] - probably NSFW, it starts with the "F" word ...
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
modified 3-Mar-17 10:54am.
|
|
|
|
|
That might get a slightly, teensy weensy bit NSFW. Just saying.
veni bibi saltavi
|
|
|
|
|
I'd forgotten that it starts with the "F" word ... edited.
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
|
|
|
|
|
... and there are quite a lot of girls who obviously didn't take their mam's advice to dress up warm. Or to dress at all for that matter.
veni bibi saltavi
|
|
|
|
|
Gary Wheeler wrote: I can't believe some of the crap they convince corporate IT departments to buy
How do you think Microsoft did so well? The office suite is some of the worst written software I have ever encountered, and yet.....
Cheers,
Mick
------------------------------------------------
It doesn't matter how often or hard you fall on your arse, eventually you'll roll over and land on your feet.
|
|
|
|
|
That sounds like a TPM-based encryption....
This should only be an issue if someone isn't backing up the TPM keys.
"There are three kinds of lies: lies, damned lies and statistics."
- Benjamin Disraeli
|
|
|
|
|
Let me put it this way. Every time we've needed to recover a hard drive, the attempt has failed. That's why my group has their own servers, running without the corporate encryption, and our working data is backed up to those servers nightly.
Software Zen: delete this;
|
|
|
|
|
Security isn't doing their job then. It might be a good thing to remind them that Availability IS a leg in the triad.
"There are three kinds of lies: lies, damned lies and statistics."
- Benjamin Disraeli
|
|
|
|
|
Take a look at:
https://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/24000/PD24871/en_US/de_710_detech_user_guide_en-us_Rev.B.pdf
|
|
|
|
|
Talk to your manager - corporate rules don't have to make sense, but you flaunt them at your own risk. Many companies will start disciplinary processes for using "unapproved" sites and / or apps on company equipment.
Just sayin', is all.
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
|
|
|
|
|
I will if this goes any further. This just pisses me off.
Software Zen: delete this;
|
|
|
|
|
Take it to your manager and let him take it further: then you can at least blame him if it all goes pear shaped!
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
|
|
|
|
|
Given how pear-shaped things already are in this place, I don't think anybody would notice. Grumble, grumble...
Software Zen: delete this;
|
|
|
|
|
Don't forget to talk to him about all the time and money you wasted taking care of that.
I'd rather be phishing!
|
|
|
|
|
The correct procedure is of course to ask the IS dweebs to show you the audit of the software on *their* machines. Oh and while you're there, their browser history
veni bibi saltavi
|
|
|
|
|
Most people only learn just barely enough to do their jobs, so they simply just do not know better. I'd talk to someone higher up and get it sorted out.
Jeremy Falcon
|
|
|
|
|
The project I'm working on gathers data from various other teams.
Some provide extracts in Excel (ptui) and they say they can't provide it any other way .
So we use the ACE Engine and SSIS' Excel Source component to read the data into SQL Server.
We've been doing this for years.
And just recently the wombats in security said, "Oh, no, you have Office installed on your servers, we can't have that".
|
|
|
|