The Lounge is rated PG. If you're about to post something you wouldn't want your
kid sister to read then don't post it. No flame wars, no abusive conduct, no programming
questions and please don't post ads.
As a side-thought about improving visibility for these challenges, have you thought of "pinning" the challenge at the top of each Q&A page for greater visibility? The previous suggestion was as a sidebar on various pages, maybe this is better as an interim solution... your thoughts?
We use Inno Setup[^] for all of our installers, and have for years. I estimate we have over a man-year of work in installers for our products, optional features, etc. Yesterday I discovered that the innosetup.com site is now blocked by our IS department, which uses McAfee Web Gateway to manage 'prohibited' sites. Today I received an email from one of the IS yabbos to the effect that Inno Setup was not on the approved list of applications. I was told to apply for approval, and then they would consider beginning the exception process for the web site.
What. The. F***.
My plans are to be the good little corporate drone and fill out whatever numb-nuts crap they ask, and then go right the f*** ahead and continue to use Inno Setup. It works, it's easy to use, it's for crap's sake FREE.
To paraphrase JSOP, they'll take my Inno Setup when they claw it from my cold, dead hard drive.
If I would have to set a list of approved / allowed applications, InnoSetup would be rated much higher than any McAfee product. In fact, the latter would be only on the list when I'm requested to put it there.
I can't believe some of the crap they convince corporate IT departments to buy. For example, our hard drives are encrypted using a McAfee product. Guess what happens if you have a motherboard fail, and you need to retrieve the data from the hard drive. You can't decrypt it. The data is completely unrecoverable.
(thinks quietly; just ignore the sound of gear teeth breaking off)
Nah. I don't think McAfee is competent to pull off any kind of extortion scheme. Besides, my wife and I are big fans of the old Perry Mason TV series[^], so I've learned how to counter every blackmail scheme known to man.
Let me put it this way. Every time we've needed to recover a hard drive, the attempt has failed. That's why my group has their own servers, running without the corporate encryption, and our working data is backed up to those servers nightly.
Talk to your manager - corporate rules don't have to make sense, but you flaunt them at your own risk. Many companies will start disciplinary processes for using "unapproved" sites and / or apps on company equipment.
Just sayin', is all.
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...