|
And consultants. Too many firms hire consultants as temporary workers, and consulence companies foster a mercenary environment - they parade us to customers singing our praises and overselling us , just like a pimp would do - so trust is hard to give.
GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++* Weapons extension: ma- k++ F+2 X
|
|
|
|
|
Yeah nothing I hate more than uppers who barely know technology trusting people outside more than inside to make up for their deficiencies. And then implementing the practice when it is convenient to them not the rest of the workforce. Ever wonder why they cause the breach and programmers and IT folk get the claim. Mainly because they are given to much power in the workforce. I honestly can't wait till AI knocks out some of the random things people justify to keep themselves from having to learn on a daily basis. That magic excel sheet I want to blow up everyday and they feel the threat so they try to keep us oppressed in the workforce. A building pipe bursts "Ohh, that was just the weather we can deal with it". My email went down "Find the IT person and skewer them" for a cloud problem that is most of the time on a vendor a consultant recommended for hype. I don't feel business people really understand how to connect the dots and I hate the don't care make it work mentality. 
|
|
|
|
|
The primary operating mode of my non-tech-savy acquittances is taking screenshots on their phones instead of sharing links when go shopping.
Second to that is taking photos.
Links may come and go, but screenshots remain!
|
|
|
|
|
I feel your pain.. My significant other does more or less the same.
Last week, I taught her for the umpteenth time how to check an sms while talking on the phone..
|
|
|
|
|
Slacker007 wrote: My laptop is currently the most secure digital device I have had in my entire life, I think. Exporting text is usually trivial. Moreso if a compiler is on the machine.
If you need to neuter the machine because you cannot trust your employees means you have a bigger problem
Bastard Programmer from Hell
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
Eddy Vluggen wrote: If you need to neuter the machine because you cannot trust your employees means you have a bigger problem
Or more than one. There are many "engineers" and "developers" who blindly click and fall for any phishing scam they see, or use their work computers for personal and potentially risky activities (gaming, sketchy p**n sites, sketchy "dating" sites, P2P, streaming...).
GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++* Weapons extension: ma- k++ F+2 X
|
|
|
|
|
Quote: use their work computers for personal and potentially risky activities
Therein lies a problem, more so if you can't block stuff like yahoo mail. We do so at the firewall but that is only on site.
A "well protected" corp laptop: Highly interlocked, protected device, with limited compute capabilities.
If you can keep your head while those about you are losing theirs, perhaps you don't understand the situation.
|
|
|
|
|
It's honestly a question of employee training and selection. If an employee has not the honesty, intelligence and integrity necessary to not f* around with company's equipment he has to go. When unapologetically laying off any employee stupid enough to not grasp the basic computer security concepts after 40 years of PC existance becomes the norm, computer security becomes the norm as well.
Dura lex, sed lex.
GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++* Weapons extension: ma- k++ F+2 X
|
|
|
|
|
I love your perfect world.
Alas, mine has a few very smart people who occasionally make dumb mistakes.
If you can keep your head while those about you are losing theirs, perhaps you don't understand the situation.
|
|
|
|
|
Occasional dumb mistakes are one thing, many people though cultivate a path of willfull ignorance and criminal negligence.
GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++* Weapons extension: ma- k++ F+2 X
|
|
|
|
|
Here, we refer to them as politicians.
If you can keep your head while those about you are losing theirs, perhaps you don't understand the situation.
|
|
|
|
|
|
Also known as the Inverse Stopped Clock
|
|
|
|
|
Quote: Dura lex, sed lex Maybe that's where Monty Python got "Cruel, but fair."
|
|
|
|
|
Well, John Cleese was a latin teacher...
GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++* Weapons extension: ma- k++ F+2 X
|
|
|
|
|
|
What you are missing is that some of these people were hired for things other than their computer skills. That guy who is dumber than a firehose around IT may be the companies best lawyer.
The IT systems are (unfortunately) configured for the average person - not developers. Unfortunately IT might not have enough resources to solve more than the average - and developers get caught up in it. . . and to be fair - I've seen my fair share of developers doing pretty stupid things as well.
Agree you need to trust people to drive safely - but enforcing seat belts is not such a bad thing. You might even find yourself thanking the seatbelts at some point when you had an "In a hurry, not thinking, just send this file, brain fade."
On the other side of the fence - provided you are not a cowboy - most IT staff (given the time) would be happy to set you up better. Speak with them - they should be your friends - not your enemies. Most of the time they can come up with something.
|
|
|
|
|
It was mainly the managers who were the culprits where I last worked. Could not believe how stupid a couple of them were.
|
|
|
|
|
Indeed.
"In testa che avete, Signor di Ceprano?"
-- Rigoletto
|
|
|
|
|
Now is a good time to remind you of one Wolfgang Amadeus Mozart and Allegri’s “Miserere mei Deus”, which the Vatican absolutely forbid to be copied, and prelates looked out for anyone who might be doing just that while it was being sung. However, the teenage Mozart went to the Tenebrae and listened. That night at home he wrote out the whole thing. note perfect, in full, all parts, in all its contrapuntal glory.
So, if you code to 'Mozart' standards ... 
|
|
|
|
|
So you cannot export the repo, zip it, and mail it?
|
|
|
|
|
all email is scanned, I know that.
I have not tried to test their scanning abilities for zip files, etc. or encrypted emails.
may raise suspicions with security. not sure. don't want to find out.
|
|
|
|
|
Just encrypt & send a text file whose only contents is "Red Herring" or some juicy but untrue gossip about yourself..
|
|
|
|
|
Slacker007 wrote: My company has the laptop encrypted with Bitlocker and so if you store something on a USB device, it encrypts it, so that only the laptop can read it back again.
Any machine running BitLocker can unlock those USB drives. You just need to know the password or recovery key.
|
|
|
|
|
Not when you are trying to recover a system in front of a customer. Recovery keys are a joke lets, make it so long you have no chance of rembering it, thank for masking tape and a pen, so you can write on the blooming stick
|
|
|
|