Skip to comments.Ten Things Your IT Department Won't Tell You
Posted on 07/31/2007 7:47:38 AM PDT by redfish53
Ten Things Your IT Department Won't Tell You By VAUHINI VARA July 30, 2007; Page R1
Admit it: For many of us, our work computer is a home away from home.
It seems only fair, since our home computer is typically an office away from the office. So in between typing up reports and poring over spreadsheets, we use our office PCs to keep up with our lives. We do birthday shopping, check out funny clips on YouTube and catch up with friends by email or instant message.
And often it's just easier to accomplish certain tasks using consumer technology than using the sometimes clunky office technology our company gives us -- compare Gmail with a corporate email account.
Security expert Mark Lobel of PricewaterhouseCoopers describes the most common things employees do on the internet to jeopardize company security. There's only one problem with what we're doing: Our employers sometimes don't like it. Partly, they want us to work while we're at work. And partly, they're afraid that what we're doing compromises the company's computer network -- putting the company at risk in a host of ways. So they've asked their information-technology departments to block us from bringing our home to work.
End of story? Not so fast. To find out whether it's possible to get around the IT departments, we asked Web experts for some advice. Specifically, we asked them to find the top 10 secrets our IT departments don't want us to know. How to surf to blocked sites without leaving any traces, for instance, or carry on instant-message chats without having to download software....
(Excerpt) Read more at online.wsj.com ...
I've got the same setup, except the DNS. I actually need it fairly often for work though, as a troubleshooting tool. It's really nice being able to just type a short string and I can verify connectivity from the outsite world to most of our websites.
I particularly enjoy reading those packets as I spread them out on my desk! My favorite ones are the packets that are secured with the little velcro tabs, because they're so easy to reseal, and nobody knows you've peeked!
They will exclude things for me also if I request them. I am a web developer/programmer and they trust (but verify) my judgement.
They aren't very savy YET. So I can check histories etc... Is there an inexpensive key logger program or do you have any suggestions on how I can monitor e-mails and web sites visits..
I have 6 computers in the house that are linked by Linksys to a cable modem. thanks for any help.
Would 18 pieces of flair express what you want to express?
Never seen those but I have watched the contents of every IM session go by in real time then get processed and sorted by user and put into a word document automatically. :)
I do the same thing to my Citrix server, at home. I can get to the outside world and come back in. It does help when I need to check on the web servers.
Of course, I can do nefarious things from there, too. But I’m a network guy, so I can change the firewall if I wanted to, anyway.
I am so glad I have a Mac and NONE of this crap has any effect other than bewondered amusement at all the problems PC users must have.
“LOL... Anyway, I was looking out my window and there are two squirrels and they were married....”
Uh, I’m going to have to ask you to move your desk. Now, if you could get it to go as far back against that wall as possible, that would be
There are even more challenging environments than industry in this regard. I went from industry to an academic environment and now in addition to the careless or thoughtless but benign worker who just wants to jigger the system so he can download nekkid pix I also have an actively malign element who (1) demands that the network work flawlessly for his or her own little term papers and (2) also regards it as a playground and an opportunity to Stick It To The Man by betraying what he or she doesn't even recognize as a trust relationship.
Most of it is human attitude, really. If you have a login name and a password you are in every real sense an insider with the ability to soil whatever nest you're being allowed into. If it stinks afterward, whose fault is that?
Oh, and as long as I'm ranting - the next idiot who breaks the system and smirks that he's found a hole gets his nose cartilidge tested by my trusty clue-by-four. Go stick nails into the tires of the football team and then complain that security shouldn't have allowed you to do that. See what it gets you. < /rant >
“Yes and the network guys probably exclude their machines from the block(s).”
Most IT guys worth their paycheck don’t.
From time to time I get an Email from a freind saying check out this Youtube video.. I click on the link and up pops “The website you are trying to access has been blocked. If you have a business need to access please contact...”
Then I go “Doooohhhh” and slap my forhead forgetting that I blocked that website.
For the most part the rules are there for a reason. For us its HIPAA and Sarbanes Oxley. If I violate the rules then the rules are useless and my efforts have been for nothing. Also we are violating the law.
We have college students who don’t know a monitor from a modem but they can yank down their AV and firewall software like pros.
We had a kid get majorly infected. He went to a Russian porn site from an email and got the infection. We asked him why he took down the AV and firewall and he told us the site recommended it. Geez!
“I do the same thing to my Citrix server, at home.”
You know you are a geek when you can say that!!!
(Hysterical laughter being stifled here.) Yeh. I think I have his brother out here.
Now, imagine 10,000 more just like him in your zone.
“Not all system administrators are misanthropic sadists, only the ones who have been doing it more than six months.”
Can I PLEASE use that line? Can I use it as a tagline if I give attribution?
.....that needs to end.....
.....by one means or another.....
“If youre shopping for a house, youll get lots of mortgage mail. if youre going to gaming sites, youll get lots of pharma / porn spams. Youll get those pesky little PDF attachment emails from going to more nefarious sites.”
I get all the above @ work and have been very protective of my email addy. (and aren’t you support folks supposed to be blocking those gaming and nefarious sites anyway?)
Since you “know” and you “can see”, you wanna explain that one to me?
Could it be because the Support folks here had a system compromised, which grabbed all the internal addresses including those of people like myself who strive to keep their accounts spam free?
“its a matter of understanding how it all works.”
yea, I know how it works. Those with an inflated sense of self importance because they *think* they “know” and “see” what’s going on just like to always blame the user and never admit that they made a mistake.
(for the record, I’m in IT, just not desktop support)
“We asked him why he took down the AV and firewall and he told us the site recommended it. Geez!”
I am an IT Director and the Email below is from a person in the Payroll Outsourcing department:
Good Morning Raymond,
I do not have the FTP file on my computer, the GL is ready to be dropped... Can you please drop it in that file for now and set me up later?
Sure. I can FTP a file if you can tell me 3 things:
1. What file?
2. Where is it stored?
3. Where do we need to send it?
I do not know the answer to any of those... LOL
I was told to just tell you about it, and you would be able to assist...
The IT is worth his paycheck only if he can serve the sales rep.
That's the kind of IT that keeps spammers in business.
The IT is worth his paycheck only if he can serve the sales rep.
That's the kind of IT that keeps spammers in business.
LOL - it’s all yours. I have a colleague who used to be a problem child until we hired him as an SA. Now he’s worse than I am. He’s taken to keeping an irrigation hammer at his desk with a sign on it reading “Ye Hammer Of Compliance.” I do think you mellow a little over time too, or at least he’d better or he’s gonna pop a blood vessel come September...
My favorite is “Why did my friend get a message that the email she tried to send me was undeliverable?”
I can't imagine handling security in an academic environment. My hat is off to you, sir.
And... You're welcome!
That’s pretty usual. I get this one all the time.
“That Word document didn’t work. It’s empty”
“When it asked ‘Do you want to run this query?’ what did you do?”
“I hit the No button”
“There you go. You got what you wanted”
Same person every time.
My all time favorite was “My PC won’t boot up. I was cleaning out the Windows directory because it had all these files that I didn’t recognize. The PC said it was out of space so I was deleting things.”. It turns out she moved all her music into the Startup directory so they would “play all day”. She ran out of RAM and started deleting things that “weren’t mine”.
Among other things, I handle backups for our company. I used to get frequent requests for restores like "I deleted a file. I don't remember the name, but it was related to (a client). Or, it might have been related to (some other unrelated client)....I don't remember. It was last week, or it might have been three months ago. I don't remember the server it was on. So, please go recover it immediately, it's critical".
Then, when I told them that I needed more info, occasionally I'd get "What part of critical don't you understand!?" then I'd hear from my boss that, per this user's supervisor's Vice President, our DR/restore process is seriously flawed and needs a complete and thorough review.
Finally, I got the powers that be to put a policy in place where I don't look at restores without a filename, location, and recovery time. Idiot cases like the one above are why IT locks down their policies so tight, IMHO.
Don't even get me started on the perils of dealing with clients that have outsourced their IT departments. I recently talked to a nice young man from India, who although being very personable, was clueless - enough so that he asked me how to spell FTP. You can't make these things up.
LOL! At my last job, I used to keep a whiffleball bat close to hand and prominently displayed at my desk...likely for some of the same reasons.
I like the hammer idea better.
IMHO those are words suitable for framing --for engraving!
.....try a pair of wire snips.....
.....every time someone pulls a fast one.....
.....just snip off the rj45 from their patch cord.....
I had an irate senior manager tell me (after she was unable to play a CD she received in the mail) “I used to work in the federal government and it wasn’t THIS locked down.” It was meant as criticism, but I took it as compliment.
Why did my friend get a message that the email she tried to send me was undeliverable?
One if my favorites is “What e-mails haven’t I received?”
Yeah, but then wouldn't the token fall out of their Token-Ring network? Perhaps it could be caught in the Ether Net.
(/obscure Dilbert reference)
.....oh, i forgot to say you need to.....
.....bend the cat5 180 degrees and tape it.....
.....to stop the flow don't you know.....
.....(actually had someone try that, lol).....
Ohh heard that one!
I have been in the biz for a while.
1. Monitor wont work but the light is on (Computer was off)
2. 5 1/4” Floppy wont work (Left in the car during Texas heat now looks like a bloated spoapilla (Mexican dessert))
3. The floppy disk is not working (pulled it out of their pocket and unfolded it then handed it to me so that I could check it)
4. The floppy drive wont let my disk go (Floppy disk was actually crammed between two drives)
5. Monitor is weird colors (took the three sticky magnets off the side of the monitor)
Just the tip of the iceberg... We love our users we truly do...
Back when I was running networks for a University all of my data centers that were student accessible had the following sign in them:
Poor Planning on Your Part does not Constitute an Emergency on Our Part!
That's the kind of IT that keeps spammers in business...
Hmm Coming from a career as a design engineer I see your point.
Some say that a firm can survive a bad engineer dept. but not a bad sales force. I'd counter that the bad engr firm just goes out of business, but the bad sales company gets bought out and just the sales group gets dumped.
I'm trying to convince myself that I *won't* work harder when I'm self-employed, than I currently do as a corporate geek. Not having a lot of luck, there. The IT shop that I'm currently in is OK, for an IT shop. Hours are moderately reasonable...I'm home for dinner most nights.
But, I gotta tell ya, when things slide downhill and I'm pulling all-nighters, or two-nighters, or all-weekenders..... getting paid for that extra time would be nice. My Dad was a consultant, and he *loved* getting those "we need you immediately" calls....he and Mom went to Europe after one of his clients had him put back together all of their AR databases that had been inadvertently purged.
The guy who brought me into this business actually used that line on an intrusive supervisor one time - I was an eyewitness. Then it turned up in Dilbert. For years I was absolutely certain that Scott Adams worked there...
Ah yes... the .zap file.
I've worked in a couple of places that had hot outlets with generated power...but this place didn't do it.
I bailed out a dentist's office at my first consulting gig. Their building had a direct hit by lightning, and it ran in on all of their modems (Ok, I'm dating myself, here...). I walk in and the receptionist says "Come quick, my PC has a problem." It's *literally* on fire, with smoke rolling out of it. She says "What can we do?" I told her (while hastily looking for something to pick it up with) that "We'll be taking it outside before it burns down the office."
Her next question was "Well, can you fix it?" lol!
Scott’s worked with me in several jobs, too. I think that he’s worked with everyone in IT.
.....i always liked the ones that said.....
.....the power went out, then.....
.....that box that my pc is plugged into started beeping.....
.....then 15 minutes later, my pc turned off while i was right in the middle of something.....
I admit it. But I have to support them, so it is good to have one that I wreck with Microsoft and Citrix updates before I have try to do it to a customer’s production server. Not all updates cause problems, but you just can’t be too sure.
Users get upset when they can’t access their Citrix server when ever and from where ever they want to.
I absolutely hate those situations. Some how, it is always my fault that I don’t know which file they need to do their work.
Well, doesn't the "U" in UPS stand for "Unlimited"? Sheesh, you IT guys don't understand how IMPORTANT it is that I get my work done! Let me call your manager to complain.
Here’s the 11th thing your IT department won’t tell you.
11. Use one of the above dodges and screw up the network and you’ll be doomed. If you get to keep your job expect extreme scrutiny of all you do and don’t lay awake at night thinking about that new high end system on your desk.
The IT Manager
too funny!! and true!!
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.