As was foretold, we've added advertisements to the forums! If you have questions, or if you encounter any bugs, please visit this thread: https://forums.penny-arcade.com/discussion/240191/forum-advertisement-faq-and-reports-thread/
We're funding a new Acquisitions Incorporated series on Kickstarter right now! Check it out at https://www.kickstarter.com/projects/pennyarcade/acquisitions-incorporated-the-series-2

[sysadmin] sexy.code = new.underpants.required

11819212324100

Posts

  • wunderbarwunderbar What Have I Done? Registered User regular
    Cog wrote: »
    Hey, fuck fiber, btw.

    the technology or the nutrient?

    Not that it matters, since it is true for both I guess.

    XBL: thewunderbar PSN: thewunderbar NNID: thewunderbar Steam: wunderbar87 Twitter: wunderbar
    Le_Goat
  • Le_GoatLe_Goat Frechified Goat Person BostonRegistered User regular
    edited June 2015
    Cog wrote: »
    wunderbar wrote: »
    Cog wrote: »
    Le_Goat wrote: »
    Cog wrote: »
    We have a test kitchen here.
    <~~~~ 134% jealous

    The best was last year when they were testing rib rubs.

    I wish I could hate you to death.

    I hear this summer it's steak seasoning. And cornbreads.
    You know what we get? These really tasty pretzel chip things with different flavorings. Sadly, I refuse to eat them because this old guy at the office doesn't ever wash his hands after using the bathroom (I've witnessed it multiple times) and just dumps his entire hand into the container. Keep in mind that he moves the tongs off the top, removes the lid, then throws his pisshands into the chips and feels around to get a handful, replaces the top, then puts the tongs back on top like it's some unwanted garnish.

    That's what we get. How do you feel about a trade?

    Le_Goat on
    While I agree that being insensitive is an issue, so is being oversensitive.
  • chamberlainchamberlain Registered User regular
    Customer: Software you support is doing this strange thing!
    Chamberlain: (this is a known issue) You need to reboot your computer.
    Customer: OK.

    (too little time passes for the XP machine she was working on to actually have been restarted)

    Customer: It is still doing it!
    Chamberlain, who has TeamViewer already running on said XP machine: Give me a second. *remote reboots machine*
    Chamberlain: All set.
    Customer: Well, it didn't work when I did it.

    https://www.youtube.com/watch?v=FAlBMTVcdIU

    Le_Goatbowen
  • Le_GoatLe_Goat Frechified Goat Person BostonRegistered User regular
    It's like they think we're completely idiotic and don't know what we're doing.

    While I agree that being insensitive is an issue, so is being oversensitive.
    Tofystedeth
  • CogCog What'd you expect? Registered User regular
    Le_Goat wrote: »
    Cog wrote: »
    wunderbar wrote: »
    Cog wrote: »
    Le_Goat wrote: »
    Cog wrote: »
    We have a test kitchen here.
    <~~~~ 134% jealous

    The best was last year when they were testing rib rubs.

    I wish I could hate you to death.

    I hear this summer it's steak seasoning. And cornbreads.
    You know what we get? These really tasty pretzel chip things with different flavorings. Sadly, I refuse to eat them because this old guy at the office doesn't ever wash his hands after using the bathroom (I've witnessed it multiple times) and just dumps his entire hand into the container. Keep in mind that he moves the tongs off the top, removes the lid, then throws his pisshands into the chips and feels around to get a handful, replaces the top, then puts the tongs back on top like it's some unwanted garnish.

    That's what we get. How do you feel about a trade?

    Well let me think about that no thanks I'm fine.

    Geth
  • CogCog What'd you expect? Registered User regular
    Le_Goat wrote: »
    It's like they think we're completely idiotic and don't know what we're doing.

    People assume everyone else is just like they are.

    bowen
  • Le_GoatLe_Goat Frechified Goat Person BostonRegistered User regular
    Cog wrote: »
    Le_Goat wrote: »
    It's like they think we're completely idiotic and don't know what we're doing.

    People assume everyone else is just like they are.
    If that were the case, I'd get yelled at a lot less and treated a lot better, lol.

    While I agree that being insensitive is an issue, so is being oversensitive.
  • CogCog What'd you expect? Registered User regular
    edited June 2015
    **BUSINESS CRITICAL shit works fine with VM on local FUCKING ANCIENT AND OUT OF WARRANTY PowerVault storage that only one FUCKING ANCIENT AND OUT OF WARRANTY esx host can communicate with**

    **Migrate certain server to SAN storage, Hot new ESX host**

    **Shit breaks**

    **Migrate back**

    **Shit works**

    FFFFFFFFFFFFFFFFFFFFFFFFUUUUUUUUUUUUUUUUUUUUU--

    Cog on
    Le_Goat
  • RandomHajileRandomHajile Not actually a Snatcher The New KremlinRegistered User regular
    Apothe0sis wrote: »
    Le_Goat wrote: »
    Le_Goat wrote: »
    Backing up your iPod is not my responsibility, so please stop asking me to help you with it on your work computer. *sigh*
    Where I work, I would just direct them to the portion of the Computer Facility Usage Policy that they signed when they were hired, where it very clearly points out that you are not allowed to connect non-approved devices to a company PC.
    We don't have that policy, because it is "inconvenient" to the end users. I must have forgotten to mention that I basically work at an adult day care.
    Yeah, I mean, it's not like we enforce it, but it's nice to have in cases like yours, if only to get people off our backs about something dumb. Our bigger problem is people clicking on bad ads/email attachments and getting hit with an encryption virus that wipes out a third of our files (1.6TB total).

    "It said there was a package waiting!"
    "They spelled 'package' wrong, they have no way of getting your email address to notify you of that. Were you even expecting a package?"
    "No."
    :|

    This is how I discovered that the two guys that had set up our backup had neglected to include our fileserver in the backups. Through great coincidence I had migrated the files to a larger drive the week before and hadn't reclaimed the virtual disk yet.
    Now is a good time to mention the file screening feature of File Server Resource Manager. You can have it shut down file sharing and notify you via email when certain file patterns are copied to the file server. Tomorrow I will try to remember to find the link I used to set it up.
    @Apothe0sis
    Here we go:
    http://jpelectron.com/sample/Info and Documents/Stop crypto badware before it ruins your day/
    They suggest actually deleting the shares and potentially shutting down the server. I made mine just shut down some services (LanmanServer in particular), because we have a DFS Replication/Namespace and I'm not sure about the ramifications of deleting a share. I did find that a couple of the services restart after a couple minutes (I think because our file servers are also domain servers), but it should inhibit the encryption virus enough for us to track it down. The notification email even tells you who it is and exactly what file they're trying to save.

    On Server 2012 R2 (and I think flat 2012), FSRM is just a Role you have to install. On older OSes, it is I think in the Resource Kit or a download? It's the same thing that enables quotas, so you may even have it installed. In my testing, it hasn't caused a noticeable performance impact.

    Of course, the flaw in the plan is that a user could stumble across one of those filename patterns and continually shut down the file services for everyone, but again, it sends their username in an email.... so you could perhaps go into that person's user drive and delete all the files there and act like you don't know what happened, but that the files are not at all recoverable. I hate users.
    So, today this plan paid huuuuuge dividends. I got the email and within 5 minutes I had the guy on the phone to unplug the network cable. No files encrypted or deleted. I mean, other than the ones on his PC, of course. But, like, whatever; it didn't take the file server with it. This dude is a high ranking accountant who has access to all kinds of files all over the server, so I would have had a bad day tomorrow.

    AiouaApothe0sisLe_GoatTL DRCogTofystedethInfidel
  • MyiagrosMyiagros Registered User regular
    I just sent that link off to my boss to see what he thinks about putting it on our clients servers.

    iRevert wrote: »
    Because if you're going to attempt to squeeze that big black monster into your slot you will need to be able to take at least 12 inches or else you're going to have a bad time...
    Steam: MyiagrosX27
  • ElaroElaro Apologetic Registered User regular
    Maybe I phrased the problem badly. Here's what I said to the programming thread:

    I want sidekiq, a ruby gem, to start and restart automatically when apache starts and restarts. My boss suggested running it as a service, and he also wants it to have the same permissions as a certain user. How do I do this?

    Children's rights are human rights.
  • Apothe0sisApothe0sis Have you ever questioned the nature of your reality? Registered User regular
    Elaro wrote: »
    Maybe I phrased the problem badly. Here's what I said to the programming thread:

    I want sidekiq, a ruby gem, to start and restart automatically when apache starts and restarts. My boss suggested running it as a service, and he also wants it to have the same permissions as a certain user. How do I do this?
    Doesn't apache have pre- and post run script configuration options?

    I think you're progably better off askingg in the Linux thread?

    Le_Goat
  • Le_GoatLe_Goat Frechified Goat Person BostonRegistered User regular
    Elaro wrote: »
    Maybe I phrased the problem badly. Here's what I said to the programming thread:

    I want sidekiq, a ruby gem, to start and restart automatically when apache starts and restarts. My boss suggested running it as a service, and he also wants it to have the same permissions as a certain user. How do I do this?
    I'm not a Linux guy, but if you run it as a service with a dependency on apache, it will shut down if Apache does and start up after Apache does. And services can be run as whomever you want.

    Of course, this is coming from a Windows guy so... I may not be of any help.

    While I agree that being insensitive is an issue, so is being oversensitive.
  • ElaroElaro Apologetic Registered User regular
    Apothe0sis wrote: »
    Elaro wrote: »
    Maybe I phrased the problem badly. Here's what I said to the programming thread:

    I want sidekiq, a ruby gem, to start and restart automatically when apache starts and restarts. My boss suggested running it as a service, and he also wants it to have the same permissions as a certain user. How do I do this?
    Doesn't apache have pre- and post run script configuration options?

    I think you're progably better off askingg in the Linux thread?

    Right. I'll go ask them.

    Children's rights are human rights.
  • TraceTrace GNU Terry Pratchett; GNU Gus; GNU Carrie Fisher; GNU Adam We Registered User regular
    Apothe0sis wrote: »
    Le_Goat wrote: »
    Le_Goat wrote: »
    Backing up your iPod is not my responsibility, so please stop asking me to help you with it on your work computer. *sigh*
    Where I work, I would just direct them to the portion of the Computer Facility Usage Policy that they signed when they were hired, where it very clearly points out that you are not allowed to connect non-approved devices to a company PC.
    We don't have that policy, because it is "inconvenient" to the end users. I must have forgotten to mention that I basically work at an adult day care.
    Yeah, I mean, it's not like we enforce it, but it's nice to have in cases like yours, if only to get people off our backs about something dumb. Our bigger problem is people clicking on bad ads/email attachments and getting hit with an encryption virus that wipes out a third of our files (1.6TB total).

    "It said there was a package waiting!"
    "They spelled 'package' wrong, they have no way of getting your email address to notify you of that. Were you even expecting a package?"
    "No."
    :|

    This is how I discovered that the two guys that had set up our backup had neglected to include our fileserver in the backups. Through great coincidence I had migrated the files to a larger drive the week before and hadn't reclaimed the virtual disk yet.
    Now is a good time to mention the file screening feature of File Server Resource Manager. You can have it shut down file sharing and notify you via email when certain file patterns are copied to the file server. Tomorrow I will try to remember to find the link I used to set it up.
    @Apothe0sis
    Here we go:
    http://jpelectron.com/sample/Info and Documents/Stop crypto badware before it ruins your day/
    They suggest actually deleting the shares and potentially shutting down the server. I made mine just shut down some services (LanmanServer in particular), because we have a DFS Replication/Namespace and I'm not sure about the ramifications of deleting a share. I did find that a couple of the services restart after a couple minutes (I think because our file servers are also domain servers), but it should inhibit the encryption virus enough for us to track it down. The notification email even tells you who it is and exactly what file they're trying to save.

    On Server 2012 R2 (and I think flat 2012), FSRM is just a Role you have to install. On older OSes, it is I think in the Resource Kit or a download? It's the same thing that enables quotas, so you may even have it installed. In my testing, it hasn't caused a noticeable performance impact.

    Of course, the flaw in the plan is that a user could stumble across one of those filename patterns and continually shut down the file services for everyone, but again, it sends their username in an email.... so you could perhaps go into that person's user drive and delete all the files there and act like you don't know what happened, but that the files are not at all recoverable. I hate users.
    So, today this plan paid huuuuuge dividends. I got the email and within 5 minutes I had the guy on the phone to unplug the network cable. No files encrypted or deleted. I mean, other than the ones on his PC, of course. But, like, whatever; it didn't take the file server with it. This dude is a high ranking accountant who has access to all kinds of files all over the server, so I would have had a bad day tomorrow.

    hahah oh my god it's like a movie.

    "The cable rip it out or we're all dooooooomed!"

  • RandomHajileRandomHajile Not actually a Snatcher The New KremlinRegistered User regular
    Trace wrote: »
    Apothe0sis wrote: »
    Le_Goat wrote: »
    Le_Goat wrote: »
    Backing up your iPod is not my responsibility, so please stop asking me to help you with it on your work computer. *sigh*
    Where I work, I would just direct them to the portion of the Computer Facility Usage Policy that they signed when they were hired, where it very clearly points out that you are not allowed to connect non-approved devices to a company PC.
    We don't have that policy, because it is "inconvenient" to the end users. I must have forgotten to mention that I basically work at an adult day care.
    Yeah, I mean, it's not like we enforce it, but it's nice to have in cases like yours, if only to get people off our backs about something dumb. Our bigger problem is people clicking on bad ads/email attachments and getting hit with an encryption virus that wipes out a third of our files (1.6TB total).

    "It said there was a package waiting!"
    "They spelled 'package' wrong, they have no way of getting your email address to notify you of that. Were you even expecting a package?"
    "No."
    :|

    This is how I discovered that the two guys that had set up our backup had neglected to include our fileserver in the backups. Through great coincidence I had migrated the files to a larger drive the week before and hadn't reclaimed the virtual disk yet.
    Now is a good time to mention the file screening feature of File Server Resource Manager. You can have it shut down file sharing and notify you via email when certain file patterns are copied to the file server. Tomorrow I will try to remember to find the link I used to set it up.
    @Apothe0sis
    Here we go:
    http://jpelectron.com/sample/Info and Documents/Stop crypto badware before it ruins your day/
    They suggest actually deleting the shares and potentially shutting down the server. I made mine just shut down some services (LanmanServer in particular), because we have a DFS Replication/Namespace and I'm not sure about the ramifications of deleting a share. I did find that a couple of the services restart after a couple minutes (I think because our file servers are also domain servers), but it should inhibit the encryption virus enough for us to track it down. The notification email even tells you who it is and exactly what file they're trying to save.

    On Server 2012 R2 (and I think flat 2012), FSRM is just a Role you have to install. On older OSes, it is I think in the Resource Kit or a download? It's the same thing that enables quotas, so you may even have it installed. In my testing, it hasn't caused a noticeable performance impact.

    Of course, the flaw in the plan is that a user could stumble across one of those filename patterns and continually shut down the file services for everyone, but again, it sends their username in an email.... so you could perhaps go into that person's user drive and delete all the files there and act like you don't know what happened, but that the files are not at all recoverable. I hate users.
    So, today this plan paid huuuuuge dividends. I got the email and within 5 minutes I had the guy on the phone to unplug the network cable. No files encrypted or deleted. I mean, other than the ones on his PC, of course. But, like, whatever; it didn't take the file server with it. This dude is a high ranking accountant who has access to all kinds of files all over the server, so I would have had a bad day tomorrow.

    hahah oh my god it's like a movie.

    "The cable rip it out or we're all dooooooomed!"
    Well, yeah, kinda. Like I mentioned in a previous post, a couple weeks ago we had to restore about a third of our 1.6TB file server because of a CryptoLocker variant. This time I didn't.

  • TraceTrace GNU Terry Pratchett; GNU Gus; GNU Carrie Fisher; GNU Adam We Registered User regular
    Trace wrote: »
    Apothe0sis wrote: »
    Le_Goat wrote: »
    Le_Goat wrote: »
    Backing up your iPod is not my responsibility, so please stop asking me to help you with it on your work computer. *sigh*
    Where I work, I would just direct them to the portion of the Computer Facility Usage Policy that they signed when they were hired, where it very clearly points out that you are not allowed to connect non-approved devices to a company PC.
    We don't have that policy, because it is "inconvenient" to the end users. I must have forgotten to mention that I basically work at an adult day care.
    Yeah, I mean, it's not like we enforce it, but it's nice to have in cases like yours, if only to get people off our backs about something dumb. Our bigger problem is people clicking on bad ads/email attachments and getting hit with an encryption virus that wipes out a third of our files (1.6TB total).

    "It said there was a package waiting!"
    "They spelled 'package' wrong, they have no way of getting your email address to notify you of that. Were you even expecting a package?"
    "No."
    :|

    This is how I discovered that the two guys that had set up our backup had neglected to include our fileserver in the backups. Through great coincidence I had migrated the files to a larger drive the week before and hadn't reclaimed the virtual disk yet.
    Now is a good time to mention the file screening feature of File Server Resource Manager. You can have it shut down file sharing and notify you via email when certain file patterns are copied to the file server. Tomorrow I will try to remember to find the link I used to set it up.
    @Apothe0sis
    Here we go:
    http://jpelectron.com/sample/Info and Documents/Stop crypto badware before it ruins your day/
    They suggest actually deleting the shares and potentially shutting down the server. I made mine just shut down some services (LanmanServer in particular), because we have a DFS Replication/Namespace and I'm not sure about the ramifications of deleting a share. I did find that a couple of the services restart after a couple minutes (I think because our file servers are also domain servers), but it should inhibit the encryption virus enough for us to track it down. The notification email even tells you who it is and exactly what file they're trying to save.

    On Server 2012 R2 (and I think flat 2012), FSRM is just a Role you have to install. On older OSes, it is I think in the Resource Kit or a download? It's the same thing that enables quotas, so you may even have it installed. In my testing, it hasn't caused a noticeable performance impact.

    Of course, the flaw in the plan is that a user could stumble across one of those filename patterns and continually shut down the file services for everyone, but again, it sends their username in an email.... so you could perhaps go into that person's user drive and delete all the files there and act like you don't know what happened, but that the files are not at all recoverable. I hate users.
    So, today this plan paid huuuuuge dividends. I got the email and within 5 minutes I had the guy on the phone to unplug the network cable. No files encrypted or deleted. I mean, other than the ones on his PC, of course. But, like, whatever; it didn't take the file server with it. This dude is a high ranking accountant who has access to all kinds of files all over the server, so I would have had a bad day tomorrow.

    hahah oh my god it's like a movie.

    "The cable rip it out or we're all dooooooomed!"
    Well, yeah, kinda. Like I mentioned in a previous post, a couple weeks ago we had to restore about a third of our 1.6TB file server because of a CryptoLocker variant. This time I didn't.

    that CryptoLocker shit is fucking -nasty- I will say that. It caused me to step back up from "basic computer security" to "Great Wall of China" regarding my home PCs.

  • RandomHajileRandomHajile Not actually a Snatcher The New KremlinRegistered User regular
    Trace wrote: »
    Trace wrote: »
    Apothe0sis wrote: »
    Le_Goat wrote: »
    Le_Goat wrote: »
    Backing up your iPod is not my responsibility, so please stop asking me to help you with it on your work computer. *sigh*
    Where I work, I would just direct them to the portion of the Computer Facility Usage Policy that they signed when they were hired, where it very clearly points out that you are not allowed to connect non-approved devices to a company PC.
    We don't have that policy, because it is "inconvenient" to the end users. I must have forgotten to mention that I basically work at an adult day care.
    Yeah, I mean, it's not like we enforce it, but it's nice to have in cases like yours, if only to get people off our backs about something dumb. Our bigger problem is people clicking on bad ads/email attachments and getting hit with an encryption virus that wipes out a third of our files (1.6TB total).

    "It said there was a package waiting!"
    "They spelled 'package' wrong, they have no way of getting your email address to notify you of that. Were you even expecting a package?"
    "No."
    :|

    This is how I discovered that the two guys that had set up our backup had neglected to include our fileserver in the backups. Through great coincidence I had migrated the files to a larger drive the week before and hadn't reclaimed the virtual disk yet.
    Now is a good time to mention the file screening feature of File Server Resource Manager. You can have it shut down file sharing and notify you via email when certain file patterns are copied to the file server. Tomorrow I will try to remember to find the link I used to set it up.
    @Apothe0sis
    Here we go:
    http://jpelectron.com/sample/Info and Documents/Stop crypto badware before it ruins your day/
    They suggest actually deleting the shares and potentially shutting down the server. I made mine just shut down some services (LanmanServer in particular), because we have a DFS Replication/Namespace and I'm not sure about the ramifications of deleting a share. I did find that a couple of the services restart after a couple minutes (I think because our file servers are also domain servers), but it should inhibit the encryption virus enough for us to track it down. The notification email even tells you who it is and exactly what file they're trying to save.

    On Server 2012 R2 (and I think flat 2012), FSRM is just a Role you have to install. On older OSes, it is I think in the Resource Kit or a download? It's the same thing that enables quotas, so you may even have it installed. In my testing, it hasn't caused a noticeable performance impact.

    Of course, the flaw in the plan is that a user could stumble across one of those filename patterns and continually shut down the file services for everyone, but again, it sends their username in an email.... so you could perhaps go into that person's user drive and delete all the files there and act like you don't know what happened, but that the files are not at all recoverable. I hate users.
    So, today this plan paid huuuuuge dividends. I got the email and within 5 minutes I had the guy on the phone to unplug the network cable. No files encrypted or deleted. I mean, other than the ones on his PC, of course. But, like, whatever; it didn't take the file server with it. This dude is a high ranking accountant who has access to all kinds of files all over the server, so I would have had a bad day tomorrow.

    hahah oh my god it's like a movie.

    "The cable rip it out or we're all dooooooomed!"
    Well, yeah, kinda. Like I mentioned in a previous post, a couple weeks ago we had to restore about a third of our 1.6TB file server because of a CryptoLocker variant. This time I didn't.

    that CryptoLocker shit is fucking -nasty- I will say that. It caused me to step back up from "basic computer security" to "Great Wall of China" regarding my home PCs.
    It is! What sucks is that most of the time, a virus/malware/scamware infection only affects the dumb user who clicked on the thing. With CryptoLocker, they don't even need to be a local admin to screw up the file server for everyone, as long as the PC can run an executable.

    What's even worse is that this appears to have happened twice on the same legit website with no prompting with IE (8 and 11). Both users may be lying to me, but they're two people I trust pretty well to not click on and run an exe/plugin installer, so I'm thinking it has something to do with an exploit in Java or Flash.

  • TL DRTL DR Not at all confident in his reflexive opinions of thingsRegistered User regular
    Ok, what am I missing here? I want to delete all files ending in ".bad.log" from all folders in the log directory.

    del i:\logs /s /q *.bad.log

    I may or may not have deleted all files in that folder this morning.

  • a5ehrena5ehren AtlantaRegistered User regular
    TL DR wrote: »
    Ok, what am I missing here? I want to delete all files ending in ".bad.log" from all folders in the log directory.

    del i:\logs /s /q *.bad.log

    I may or may not have deleted all files in that folder this morning.

    You needed to do

    del /s /q i:\logs\*.bad.log

    I think. Separating the path and the file pattern doesn't usually work, but I'm not a Windows command-line expert.

  • Le_GoatLe_Goat Frechified Goat Person BostonRegistered User regular
    I've been dealing with a macro issue in Word for the last couple of months, working on it sporadically because it pisses me off that it wasn't working. The macro was simple: print the current page to Tray 2. It's that simple. Everything was working fine until a couple of months ago when one of our squeaky wheels starts getting pissy about the macro, saying that it's broken. Turns out she's right. When you run the macro, it prints Page 1 to Tray 2; you can have the cursor on Page 231 and it will print Page 1.

    I finally had it and decided I was going to nail this damn thing down. I poured over all the code and possible options, but they all lead to "This should just fucking work!" And then, by the grace of Jibbers Crabst, I found this thread. Apparently a Word patch in April broke macros that call upon printing to the current page. The workaround is to uninstall KB2965224, but that's not going to happen because users can't be trusted.

    But seriously though, how fucking random is it to have a patch break wdPrintCurrentPage.

    While I agree that being insensitive is an issue, so is being oversensitive.
  • Mr_RoseMr_Rose 83 Blue Ridge Protects the Holy Registered User regular
    a5ehren wrote: »
    TL DR wrote: »
    Ok, what am I missing here? I want to delete all files ending in ".bad.log" from all folders in the log directory.

    del i:\logs /s /q *.bad.log

    I may or may not have deleted all files in that folder this morning.

    You needed to do

    del /s /q i:\logs\*.bad.log

    I think. Separating the path and the file pattern doesn't usually work, but I'm not a Windows command-line expert.

    Yeah, that. The command you effectively entered was "del i:\logs" as in the whole folder, except del doesn't do directories so it went after every file in the folder instead. Switches go before arguments and command.com ignores anything on the end of a command that it doesn't understand, as long as everything before that is a recognisable instruction.

    ...because dragons are AWESOME! That's why.
    Nintendo Network ID: AzraelRose
    DropBox invite link - get 500MB extra free.
  • CogCog What'd you expect? Registered User regular
    Jesus FUCK, eat my shit Backup Exec, GOD.

    Le_GoatApothe0sis
  • wunderbarwunderbar What Have I Done? Registered User regular
    Cog wrote: »
    Jesus FUCK, eat my shit Backup Exec, GOD.

    1384912856-1.jpg

    XBL: thewunderbar PSN: thewunderbar NNID: thewunderbar Steam: wunderbar87 Twitter: wunderbar
    Le_Goat
  • CogCog What'd you expect? Registered User regular
    Awwww.... I can't stay mad at you.

    No wait, I can totally stay mad at you.

    Le_Goat
  • Le_GoatLe_Goat Frechified Goat Person BostonRegistered User regular
    edited June 2015
    I need to find non-security updates that require reboots so that when users really piss me off, I'll just approve it and make them restart... they hate that. It'll be for something stupid, like a change in some Korean font

    Le_Goat on
    While I agree that being insensitive is an issue, so is being oversensitive.
    schusswunderbar
  • TofystedethTofystedeth Registered User regular
    A BOFH for the modern era.

    steam_sig.png
  • TofystedethTofystedeth Registered User regular
    Trace wrote: »
    Apothe0sis wrote: »
    Le_Goat wrote: »
    Le_Goat wrote: »
    Backing up your iPod is not my responsibility, so please stop asking me to help you with it on your work computer. *sigh*
    Where I work, I would just direct them to the portion of the Computer Facility Usage Policy that they signed when they were hired, where it very clearly points out that you are not allowed to connect non-approved devices to a company PC.
    We don't have that policy, because it is "inconvenient" to the end users. I must have forgotten to mention that I basically work at an adult day care.
    Yeah, I mean, it's not like we enforce it, but it's nice to have in cases like yours, if only to get people off our backs about something dumb. Our bigger problem is people clicking on bad ads/email attachments and getting hit with an encryption virus that wipes out a third of our files (1.6TB total).

    "It said there was a package waiting!"
    "They spelled 'package' wrong, they have no way of getting your email address to notify you of that. Were you even expecting a package?"
    "No."
    :|

    This is how I discovered that the two guys that had set up our backup had neglected to include our fileserver in the backups. Through great coincidence I had migrated the files to a larger drive the week before and hadn't reclaimed the virtual disk yet.
    Now is a good time to mention the file screening feature of File Server Resource Manager. You can have it shut down file sharing and notify you via email when certain file patterns are copied to the file server. Tomorrow I will try to remember to find the link I used to set it up.
    @Apothe0sis
    Here we go:
    http://jpelectron.com/sample/Info and Documents/Stop crypto badware before it ruins your day/
    They suggest actually deleting the shares and potentially shutting down the server. I made mine just shut down some services (LanmanServer in particular), because we have a DFS Replication/Namespace and I'm not sure about the ramifications of deleting a share. I did find that a couple of the services restart after a couple minutes (I think because our file servers are also domain servers), but it should inhibit the encryption virus enough for us to track it down. The notification email even tells you who it is and exactly what file they're trying to save.

    On Server 2012 R2 (and I think flat 2012), FSRM is just a Role you have to install. On older OSes, it is I think in the Resource Kit or a download? It's the same thing that enables quotas, so you may even have it installed. In my testing, it hasn't caused a noticeable performance impact.

    Of course, the flaw in the plan is that a user could stumble across one of those filename patterns and continually shut down the file services for everyone, but again, it sends their username in an email.... so you could perhaps go into that person's user drive and delete all the files there and act like you don't know what happened, but that the files are not at all recoverable. I hate users.
    So, today this plan paid huuuuuge dividends. I got the email and within 5 minutes I had the guy on the phone to unplug the network cable. No files encrypted or deleted. I mean, other than the ones on his PC, of course. But, like, whatever; it didn't take the file server with it. This dude is a high ranking accountant who has access to all kinds of files all over the server, so I would have had a bad day tomorrow.

    hahah oh my god it's like a movie.

    "The cable rip it out or we're all dooooooomed!"

    I was watching White Collar the other night and they dumbassedly plugged in a USB drive they got from a criminal hacker (b-b-b-but we scanned it for viruses) into a network connected laptop. They run out of the conference room screaming "OMG everybody unplug your network cables!" and every gets up and pulls the power cable to the monitor.

    steam_sig.png
  • CogCog What'd you expect? Registered User regular
    Trace wrote: »
    Apothe0sis wrote: »
    Le_Goat wrote: »
    Le_Goat wrote: »
    Backing up your iPod is not my responsibility, so please stop asking me to help you with it on your work computer. *sigh*
    Where I work, I would just direct them to the portion of the Computer Facility Usage Policy that they signed when they were hired, where it very clearly points out that you are not allowed to connect non-approved devices to a company PC.
    We don't have that policy, because it is "inconvenient" to the end users. I must have forgotten to mention that I basically work at an adult day care.
    Yeah, I mean, it's not like we enforce it, but it's nice to have in cases like yours, if only to get people off our backs about something dumb. Our bigger problem is people clicking on bad ads/email attachments and getting hit with an encryption virus that wipes out a third of our files (1.6TB total).

    "It said there was a package waiting!"
    "They spelled 'package' wrong, they have no way of getting your email address to notify you of that. Were you even expecting a package?"
    "No."
    :|

    This is how I discovered that the two guys that had set up our backup had neglected to include our fileserver in the backups. Through great coincidence I had migrated the files to a larger drive the week before and hadn't reclaimed the virtual disk yet.
    Now is a good time to mention the file screening feature of File Server Resource Manager. You can have it shut down file sharing and notify you via email when certain file patterns are copied to the file server. Tomorrow I will try to remember to find the link I used to set it up.
    @Apothe0sis
    Here we go:
    http://jpelectron.com/sample/Info and Documents/Stop crypto badware before it ruins your day/
    They suggest actually deleting the shares and potentially shutting down the server. I made mine just shut down some services (LanmanServer in particular), because we have a DFS Replication/Namespace and I'm not sure about the ramifications of deleting a share. I did find that a couple of the services restart after a couple minutes (I think because our file servers are also domain servers), but it should inhibit the encryption virus enough for us to track it down. The notification email even tells you who it is and exactly what file they're trying to save.

    On Server 2012 R2 (and I think flat 2012), FSRM is just a Role you have to install. On older OSes, it is I think in the Resource Kit or a download? It's the same thing that enables quotas, so you may even have it installed. In my testing, it hasn't caused a noticeable performance impact.

    Of course, the flaw in the plan is that a user could stumble across one of those filename patterns and continually shut down the file services for everyone, but again, it sends their username in an email.... so you could perhaps go into that person's user drive and delete all the files there and act like you don't know what happened, but that the files are not at all recoverable. I hate users.
    So, today this plan paid huuuuuge dividends. I got the email and within 5 minutes I had the guy on the phone to unplug the network cable. No files encrypted or deleted. I mean, other than the ones on his PC, of course. But, like, whatever; it didn't take the file server with it. This dude is a high ranking accountant who has access to all kinds of files all over the server, so I would have had a bad day tomorrow.

    hahah oh my god it's like a movie.

    "The cable rip it out or we're all dooooooomed!"

    I was watching White Collar the other night and they dumbassedly plugged in a USB drive they got from a criminal hacker (b-b-b-but we scanned it for viruses) into a network connected laptop. They run out of the conference room screaming "OMG everybody unplug your network cables!" and every gets up and pulls the power cable to the monitor.

    There's a reason I don't watch network television.

    Le_Goat
  • TryCatcherTryCatcher Registered User regular
    I'm the only one that finds all the hacker romanticism unbereable?

    I mean, we have pictures like these on actual newspapers:

    125B5EAB000005DC-3095198-image-a-62_1432485706115.jpg

    Between that and "The Deep Web (tm)", the whole thing seems like everybody thinking that computers work like in the movies. Including those that know better, but pretend otherwise for street cred.

  • Apothe0sisApothe0sis Have you ever questioned the nature of your reality? Registered User regular
    Cog wrote: »
    Jesus FUCK, eat my shit Backup Exec, GOD.

    what happen

  • TL DRTL DR Not at all confident in his reflexive opinions of thingsRegistered User regular
    a5ehren wrote: »
    TL DR wrote: »
    Ok, what am I missing here? I want to delete all files ending in ".bad.log" from all folders in the log directory.

    del i:\logs /s /q *.bad.log

    I may or may not have deleted all files in that folder this morning.

    You needed to do

    del /s /q i:\logs\*.bad.log

    I think. Separating the path and the file pattern doesn't usually work, but I'm not a Windows command-line expert.

    Ah, thanks.

  • Donovan PuppyfuckerDonovan Puppyfucker A dagger in the dark is worth a thousand swords in the morningRegistered User regular
    TryCatcher wrote: »
    I'm the only one that finds all the hacker romanticism unbereable?

    I mean, we have pictures like these on actual newspapers:

    125B5EAB000005DC-3095198-image-a-62_1432485706115.jpg

    Between that and "The Deep Web (tm)", the whole thing seems like everybody thinking that computers work like in the movies. Including those that know better, but pretend otherwise for street cred.

    Psshhh, don't try to pretend like you don't hack the Gibson from within the safety of your cyber-punk underground lair filled with illegally-obtained (scantily clad) women, guns, and drugs on a regular basis!

    SeidkonaLe_GoatMuppetman
  • CogCog What'd you expect? Registered User regular
    edited June 2015
    Apothe0sis wrote: »
    Cog wrote: »
    Jesus FUCK, eat my shit Backup Exec, GOD.

    what happen

    Our tape library pissed its pants, and for some reason the fix was to swap drivers from the Symantec drivers it had been using to IBM drivers (Dell's tape libraries tend to be rebranded IBMs). Ever since then, my backups are failing to verify the ADAM & AD LDS tlog backup of one of my vcenter servers. It's been a fucking month now and I haven't had a verified backup. My daily jobs are on hold (I can pull from VSS thankfully) and the actual file backup portion of the weekly and monthly jobs are completing, but we're required to get the verification or our auditors crawl up our asses.

    The really fucking irritating part is that in the itemized job history, the vcenter server shows the ADAM/AD LDS tlog verify begin and complete successfully but the job log itself reports that portion as failed.

    So in summaray, eat my shit, Backup Exec.

    Cog on
  • SeidkonaSeidkona Had an upgrade Registered User regular
    edited June 2015
    TryCatcher wrote: »
    I'm the only one that finds all the hacker romanticism unbereable?

    I mean, we have pictures like these on actual newspapers:

    125B5EAB000005DC-3095198-image-a-62_1432485706115.jpg

    Between that and "The Deep Web (tm)", the whole thing seems like everybody thinking that computers work like in the movies. Including those that know better, but pretend otherwise for street cred.

    Shhhhhhh. You'll blow our cover.

    Seidkona on
    Mostly just huntin' monsters.
    XBL:Phenyhelm - 3DS:Phenyhelm
    Le_Goat
  • DehumanizedDehumanized Registered User regular
    to be fair i'm only wearing a skimask and a sweater because the AC in my office is turned to ice age

  • wunderbarwunderbar What Have I Done? Registered User regular
    to be fair i'm only wearing a skimask and a sweater because the AC in my office is turned to ice age

    Ice Age > melting. Every time.

    XBL: thewunderbar PSN: thewunderbar NNID: thewunderbar Steam: wunderbar87 Twitter: wunderbar
    CogLe_GoaturahonkyTryCatcherDonovan Puppyfucker
  • CogCog What'd you expect? Registered User regular
    I'll take a hot day over a cold one though.

  • Le_GoatLe_Goat Frechified Goat Person BostonRegistered User regular
    Cog wrote: »
    I'll take a hot day over a cold one though.
    Hell no. There is only so much you can legally take off. Conversely, you can always put more on during the cold months; it's like being in giant PJs where you feel like you're still in bed.

    I find that (at least up here) the people who bitch about the cold the most are the ones trying to look fashionable/cool during it.

    While I agree that being insensitive is an issue, so is being oversensitive.
    ironsizideSeidkonaurahonkyschussDonovan Puppyfucker
  • wunderbarwunderbar What Have I Done? Registered User regular
    I live somewhere that gets down to about -30C (-25F or so) in winter. by September I'm cursing the heat, but then in January I'm wishing for +30 again. it is all relative =D

    XBL: thewunderbar PSN: thewunderbar NNID: thewunderbar Steam: wunderbar87 Twitter: wunderbar
This discussion has been closed.