• 1 Post
  • 29 Comments
Joined 1 year ago
cake
Cake day: June 20th, 2023

help-circle




  • Hold up… You thought maybe you downloaded malware (which in this case that was not the only cause) so you took it upon yourself to reinstall windows on a company issued laptop?

    1. Why are you trying to fix it? Submit It ticket and it’s their problem.

    2. If you suspect malware alert it security immediately. Many malware act as a gateway to lock other systems. Yes you might get in trouble but I’d rather be yelled at for downloading something then yelled at for infecting my company servers will ransomware/malware.

    3. Atleast in my company a computer connecting without a company supplied image of windows will be denied. Completely understand you not connecting to the internet.

    4. This problem was not caused by you but could of been… Take this as a lesson to be more proactive in the future.




  • I had that experience last week. I half blame the language though cause the way it works is you don’t initialize a variable, first time you use it the language automatically makes the variable and default value is 0.

    I had a variable countoot that I had a formula calculate. Then a simple if countoot > 0 do this else do that. The program kept doing that. I knew countoot should be 2. I manually did the formula … The answer was two.

    I did the same formula in 3 other programs and it worked correctly. I spent between 1.5 to 2 hours a day for like 3 days banging my head on the desk trying to figure out why it would work. Fourth day me and 2 other guys were trying to figure it out when I finally really looked closely. I realized the formula result was stored in ccountoot(notice 2 c) and the if statement was based on countoot(notice 1 c)…yeah I felt so stupid when correcting the typo fixed the problem.



  • The difference is in exact wording Agile: the software shall properly authticate a user within our active directory.

    Documention : user authentication will be provided by functions ”valisate username” as described in section 14,7 subsection 4, ”validate password” as described in section 16.2 and validate the correct pasword as described in section 23.4.Proper authication to the correct use group shall comply with the requirements in document 654689 section 64.7 subsection 17

    Yes there is a difference and one is better…



  • Long story short… Most of the money the company earned was from the credit union. I went through a depression phase and tried to kill myself (I’m doing better now) so I was inpatient in a mental ward for about a month.

    The credit union got a computer security audit from the ncua(similar to fdic but for credit unions). My boss could not access any system. No servers, no firewalls, no intrusion detection systems, nothing. I had the passwords but was unable to be contacted and “documentation was a waste of time”.

    They failed the audit. Credit union basically asked “we pay you for computer security, we failed an audit for computer security, so why do we pay you?”

    Contract was lost and company went under shortly afterwards.


  • Ok, I’ll give my experience. I was hired as basically a paid intern. I was in high school, I “knew” computers like a nerdy teenager knows computers… Not real knowledge of their workings but I played with some programming(I got hello world to work using perl) , I could install linux(in the early 2000s, I bought copy of Debian Linux on 7 cds). I was basically told I would be an assistant to the other computer technician.

    A week after I got hired, he got fired. For the next several months people got hired and fired after a 2-3 weeks. The company was 3 people, myself, the owner, his wife did the accounting. I didn’t know what I was doing, googling what I could to figure stuff out(i now know that’s normal but also now know how to Google correctly). I leaned on the owner to figure out things. I don’t know if your job is in computers but these are things I learned later were absolutely idiotic.

    1. If a computer came in with a suspected virus, standard protocol was no research or investigation… Format and reinstall.

    2. We had corporate clients (main client was a credit union), we gave the windows CD and license code to each teller with no record of what they were. He sold the license at the price he bought then for from staples.

    3. All servers had local admin accounts. All local admin accounts had similar passwords. I was the only person who knew what those passwords were.

    4. My boss thought time spent documenting was time wasted.

    Anyways I stayed there for 4 years. It was not perfect and I learned so much wrong stuff. It was a decent job, my boss had really weird rules(why so many people got fired), and my time would of been spent better learning correct information.

    That said I ended up causing the company to go bankrupt and the owner and his wife are now Christian consulers…