The best was last year when they were testing rib rubs.
I wish I could hate you to death.
I hear this summer it's steak seasoning. And cornbreads.
You know what we get? These really tasty pretzel chip things with different flavorings. Sadly, I refuse to eat them because this old guy at the office doesn't ever wash his hands after using the bathroom (I've witnessed it multiple times) and just dumps his entire hand into the container. Keep in mind that he moves the tongs off the top, removes the lid, then throws his pisshands into the chips and feels around to get a handful, replaces the top, then puts the tongs back on top like it's some unwanted garnish.
That's what we get. How do you feel about a trade?
Le_Goat on
While I agree that being insensitive is an issue, so is being oversensitive.
Customer: Software you support is doing this strange thing!
Chamberlain: (this is a known issue) You need to reboot your computer.
Customer: OK.
(too little time passes for the XP machine she was working on to actually have been restarted)
Customer: It is still doing it!
Chamberlain, who has TeamViewer already running on said XP machine: Give me a second. *remote reboots machine*
Chamberlain: All set.
Customer: Well, it didn't work when I did it.
The best was last year when they were testing rib rubs.
I wish I could hate you to death.
I hear this summer it's steak seasoning. And cornbreads.
You know what we get? These really tasty pretzel chip things with different flavorings. Sadly, I refuse to eat them because this old guy at the office doesn't ever wash his hands after using the bathroom (I've witnessed it multiple times) and just dumps his entire hand into the container. Keep in mind that he moves the tongs off the top, removes the lid, then throws his pisshands into the chips and feels around to get a handful, replaces the top, then puts the tongs back on top like it's some unwanted garnish.
That's what we get. How do you feel about a trade?
**BUSINESS CRITICAL shit works fine with VM on local FUCKING ANCIENT AND OUT OF WARRANTY PowerVault storage that only one FUCKING ANCIENT AND OUT OF WARRANTY esx host can communicate with**
**Migrate certain server to SAN storage, Hot new ESX host**
**Shit breaks**
**Migrate back**
**Shit works**
FFFFFFFFFFFFFFFFFFFFFFFFUUUUUUUUUUUUUUUUUUUUU--
Cog on
+1
RandomHajileNot actually a SnatcherThe New KremlinRegistered Userregular
Backing up your iPod is not my responsibility, so please stop asking me to help you with it on your work computer. *sigh*
Where I work, I would just direct them to the portion of the Computer Facility Usage Policy that they signed when they were hired, where it very clearly points out that you are not allowed to connect non-approved devices to a company PC.
We don't have that policy, because it is "inconvenient" to the end users. I must have forgotten to mention that I basically work at an adult day care.
Yeah, I mean, it's not like we enforce it, but it's nice to have in cases like yours, if only to get people off our backs about something dumb. Our bigger problem is people clicking on bad ads/email attachments and getting hit with an encryption virus that wipes out a third of our files (1.6TB total).
"It said there was a package waiting!"
"They spelled 'package' wrong, they have no way of getting your email address to notify you of that. Were you even expecting a package?"
"No."
This is how I discovered that the two guys that had set up our backup had neglected to include our fileserver in the backups. Through great coincidence I had migrated the files to a larger drive the week before and hadn't reclaimed the virtual disk yet.
Now is a good time to mention the file screening feature of File Server Resource Manager. You can have it shut down file sharing and notify you via email when certain file patterns are copied to the file server. Tomorrow I will try to remember to find the link I used to set it up.
@Apothe0sis
Here we go: http://jpelectron.com/sample/Info and Documents/Stop crypto badware before it ruins your day/
They suggest actually deleting the shares and potentially shutting down the server. I made mine just shut down some services (LanmanServer in particular), because we have a DFS Replication/Namespace and I'm not sure about the ramifications of deleting a share. I did find that a couple of the services restart after a couple minutes (I think because our file servers are also domain servers), but it should inhibit the encryption virus enough for us to track it down. The notification email even tells you who it is and exactly what file they're trying to save.
On Server 2012 R2 (and I think flat 2012), FSRM is just a Role you have to install. On older OSes, it is I think in the Resource Kit or a download? It's the same thing that enables quotas, so you may even have it installed. In my testing, it hasn't caused a noticeable performance impact.
Of course, the flaw in the plan is that a user could stumble across one of those filename patterns and continually shut down the file services for everyone, but again, it sends their username in an email.... so you could perhaps go into that person's user drive and delete all the files there and act like you don't know what happened, but that the files are not at all recoverable. I hate users.
So, today this plan paid huuuuuge dividends. I got the email and within 5 minutes I had the guy on the phone to unplug the network cable. No files encrypted or deleted. I mean, other than the ones on his PC, of course. But, like, whatever; it didn't take the file server with it. This dude is a high ranking accountant who has access to all kinds of files all over the server, so I would have had a bad day tomorrow.
Because if you're going to attempt to squeeze that big black monster into your slot you will need to be able to take at least 12 inches or else you're going to have a bad time...
Maybe I phrased the problem badly. Here's what I said to the programming thread:
I want sidekiq, a ruby gem, to start and restart automatically when apache starts and restarts. My boss suggested running it as a service, and he also wants it to have the same permissions as a certain user. How do I do this?
Children's rights are human rights.
0
Apothe0sisHave you ever questioned the nature of your reality?Registered Userregular
Maybe I phrased the problem badly. Here's what I said to the programming thread:
I want sidekiq, a ruby gem, to start and restart automatically when apache starts and restarts. My boss suggested running it as a service, and he also wants it to have the same permissions as a certain user. How do I do this?
Doesn't apache have pre- and post run script configuration options?
I think you're progably better off askingg in the Linux thread?
Maybe I phrased the problem badly. Here's what I said to the programming thread:
I want sidekiq, a ruby gem, to start and restart automatically when apache starts and restarts. My boss suggested running it as a service, and he also wants it to have the same permissions as a certain user. How do I do this?
I'm not a Linux guy, but if you run it as a service with a dependency on apache, it will shut down if Apache does and start up after Apache does. And services can be run as whomever you want.
Of course, this is coming from a Windows guy so... I may not be of any help.
While I agree that being insensitive is an issue, so is being oversensitive.
Maybe I phrased the problem badly. Here's what I said to the programming thread:
I want sidekiq, a ruby gem, to start and restart automatically when apache starts and restarts. My boss suggested running it as a service, and he also wants it to have the same permissions as a certain user. How do I do this?
Doesn't apache have pre- and post run script configuration options?
I think you're progably better off askingg in the Linux thread?
Right. I'll go ask them.
Children's rights are human rights.
0
TraceGNU Terry Pratchett; GNU Gus; GNU Carrie Fisher; GNU Adam WeRegistered Userregular
Backing up your iPod is not my responsibility, so please stop asking me to help you with it on your work computer. *sigh*
Where I work, I would just direct them to the portion of the Computer Facility Usage Policy that they signed when they were hired, where it very clearly points out that you are not allowed to connect non-approved devices to a company PC.
We don't have that policy, because it is "inconvenient" to the end users. I must have forgotten to mention that I basically work at an adult day care.
Yeah, I mean, it's not like we enforce it, but it's nice to have in cases like yours, if only to get people off our backs about something dumb. Our bigger problem is people clicking on bad ads/email attachments and getting hit with an encryption virus that wipes out a third of our files (1.6TB total).
"It said there was a package waiting!"
"They spelled 'package' wrong, they have no way of getting your email address to notify you of that. Were you even expecting a package?"
"No."
This is how I discovered that the two guys that had set up our backup had neglected to include our fileserver in the backups. Through great coincidence I had migrated the files to a larger drive the week before and hadn't reclaimed the virtual disk yet.
Now is a good time to mention the file screening feature of File Server Resource Manager. You can have it shut down file sharing and notify you via email when certain file patterns are copied to the file server. Tomorrow I will try to remember to find the link I used to set it up.
@Apothe0sis
Here we go: http://jpelectron.com/sample/Info and Documents/Stop crypto badware before it ruins your day/
They suggest actually deleting the shares and potentially shutting down the server. I made mine just shut down some services (LanmanServer in particular), because we have a DFS Replication/Namespace and I'm not sure about the ramifications of deleting a share. I did find that a couple of the services restart after a couple minutes (I think because our file servers are also domain servers), but it should inhibit the encryption virus enough for us to track it down. The notification email even tells you who it is and exactly what file they're trying to save.
On Server 2012 R2 (and I think flat 2012), FSRM is just a Role you have to install. On older OSes, it is I think in the Resource Kit or a download? It's the same thing that enables quotas, so you may even have it installed. In my testing, it hasn't caused a noticeable performance impact.
Of course, the flaw in the plan is that a user could stumble across one of those filename patterns and continually shut down the file services for everyone, but again, it sends their username in an email.... so you could perhaps go into that person's user drive and delete all the files there and act like you don't know what happened, but that the files are not at all recoverable. I hate users.
So, today this plan paid huuuuuge dividends. I got the email and within 5 minutes I had the guy on the phone to unplug the network cable. No files encrypted or deleted. I mean, other than the ones on his PC, of course. But, like, whatever; it didn't take the file server with it. This dude is a high ranking accountant who has access to all kinds of files all over the server, so I would have had a bad day tomorrow.
hahah oh my god it's like a movie.
"The cable rip it out or we're all dooooooomed!"
0
RandomHajileNot actually a SnatcherThe New KremlinRegistered Userregular
Backing up your iPod is not my responsibility, so please stop asking me to help you with it on your work computer. *sigh*
Where I work, I would just direct them to the portion of the Computer Facility Usage Policy that they signed when they were hired, where it very clearly points out that you are not allowed to connect non-approved devices to a company PC.
We don't have that policy, because it is "inconvenient" to the end users. I must have forgotten to mention that I basically work at an adult day care.
Yeah, I mean, it's not like we enforce it, but it's nice to have in cases like yours, if only to get people off our backs about something dumb. Our bigger problem is people clicking on bad ads/email attachments and getting hit with an encryption virus that wipes out a third of our files (1.6TB total).
"It said there was a package waiting!"
"They spelled 'package' wrong, they have no way of getting your email address to notify you of that. Were you even expecting a package?"
"No."
This is how I discovered that the two guys that had set up our backup had neglected to include our fileserver in the backups. Through great coincidence I had migrated the files to a larger drive the week before and hadn't reclaimed the virtual disk yet.
Now is a good time to mention the file screening feature of File Server Resource Manager. You can have it shut down file sharing and notify you via email when certain file patterns are copied to the file server. Tomorrow I will try to remember to find the link I used to set it up.
@Apothe0sis
Here we go: http://jpelectron.com/sample/Info and Documents/Stop crypto badware before it ruins your day/
They suggest actually deleting the shares and potentially shutting down the server. I made mine just shut down some services (LanmanServer in particular), because we have a DFS Replication/Namespace and I'm not sure about the ramifications of deleting a share. I did find that a couple of the services restart after a couple minutes (I think because our file servers are also domain servers), but it should inhibit the encryption virus enough for us to track it down. The notification email even tells you who it is and exactly what file they're trying to save.
On Server 2012 R2 (and I think flat 2012), FSRM is just a Role you have to install. On older OSes, it is I think in the Resource Kit or a download? It's the same thing that enables quotas, so you may even have it installed. In my testing, it hasn't caused a noticeable performance impact.
Of course, the flaw in the plan is that a user could stumble across one of those filename patterns and continually shut down the file services for everyone, but again, it sends their username in an email.... so you could perhaps go into that person's user drive and delete all the files there and act like you don't know what happened, but that the files are not at all recoverable. I hate users.
So, today this plan paid huuuuuge dividends. I got the email and within 5 minutes I had the guy on the phone to unplug the network cable. No files encrypted or deleted. I mean, other than the ones on his PC, of course. But, like, whatever; it didn't take the file server with it. This dude is a high ranking accountant who has access to all kinds of files all over the server, so I would have had a bad day tomorrow.
hahah oh my god it's like a movie.
"The cable rip it out or we're all dooooooomed!"
Well, yeah, kinda. Like I mentioned in a previous post, a couple weeks ago we had to restore about a third of our 1.6TB file server because of a CryptoLocker variant. This time I didn't.
Backing up your iPod is not my responsibility, so please stop asking me to help you with it on your work computer. *sigh*
Where I work, I would just direct them to the portion of the Computer Facility Usage Policy that they signed when they were hired, where it very clearly points out that you are not allowed to connect non-approved devices to a company PC.
We don't have that policy, because it is "inconvenient" to the end users. I must have forgotten to mention that I basically work at an adult day care.
Yeah, I mean, it's not like we enforce it, but it's nice to have in cases like yours, if only to get people off our backs about something dumb. Our bigger problem is people clicking on bad ads/email attachments and getting hit with an encryption virus that wipes out a third of our files (1.6TB total).
"It said there was a package waiting!"
"They spelled 'package' wrong, they have no way of getting your email address to notify you of that. Were you even expecting a package?"
"No."
This is how I discovered that the two guys that had set up our backup had neglected to include our fileserver in the backups. Through great coincidence I had migrated the files to a larger drive the week before and hadn't reclaimed the virtual disk yet.
Now is a good time to mention the file screening feature of File Server Resource Manager. You can have it shut down file sharing and notify you via email when certain file patterns are copied to the file server. Tomorrow I will try to remember to find the link I used to set it up.
@Apothe0sis
Here we go: http://jpelectron.com/sample/Info and Documents/Stop crypto badware before it ruins your day/
They suggest actually deleting the shares and potentially shutting down the server. I made mine just shut down some services (LanmanServer in particular), because we have a DFS Replication/Namespace and I'm not sure about the ramifications of deleting a share. I did find that a couple of the services restart after a couple minutes (I think because our file servers are also domain servers), but it should inhibit the encryption virus enough for us to track it down. The notification email even tells you who it is and exactly what file they're trying to save.
On Server 2012 R2 (and I think flat 2012), FSRM is just a Role you have to install. On older OSes, it is I think in the Resource Kit or a download? It's the same thing that enables quotas, so you may even have it installed. In my testing, it hasn't caused a noticeable performance impact.
Of course, the flaw in the plan is that a user could stumble across one of those filename patterns and continually shut down the file services for everyone, but again, it sends their username in an email.... so you could perhaps go into that person's user drive and delete all the files there and act like you don't know what happened, but that the files are not at all recoverable. I hate users.
So, today this plan paid huuuuuge dividends. I got the email and within 5 minutes I had the guy on the phone to unplug the network cable. No files encrypted or deleted. I mean, other than the ones on his PC, of course. But, like, whatever; it didn't take the file server with it. This dude is a high ranking accountant who has access to all kinds of files all over the server, so I would have had a bad day tomorrow.
hahah oh my god it's like a movie.
"The cable rip it out or we're all dooooooomed!"
Well, yeah, kinda. Like I mentioned in a previous post, a couple weeks ago we had to restore about a third of our 1.6TB file server because of a CryptoLocker variant. This time I didn't.
that CryptoLocker shit is fucking -nasty- I will say that. It caused me to step back up from "basic computer security" to "Great Wall of China" regarding my home PCs.
0
RandomHajileNot actually a SnatcherThe New KremlinRegistered Userregular
Backing up your iPod is not my responsibility, so please stop asking me to help you with it on your work computer. *sigh*
Where I work, I would just direct them to the portion of the Computer Facility Usage Policy that they signed when they were hired, where it very clearly points out that you are not allowed to connect non-approved devices to a company PC.
We don't have that policy, because it is "inconvenient" to the end users. I must have forgotten to mention that I basically work at an adult day care.
Yeah, I mean, it's not like we enforce it, but it's nice to have in cases like yours, if only to get people off our backs about something dumb. Our bigger problem is people clicking on bad ads/email attachments and getting hit with an encryption virus that wipes out a third of our files (1.6TB total).
"It said there was a package waiting!"
"They spelled 'package' wrong, they have no way of getting your email address to notify you of that. Were you even expecting a package?"
"No."
This is how I discovered that the two guys that had set up our backup had neglected to include our fileserver in the backups. Through great coincidence I had migrated the files to a larger drive the week before and hadn't reclaimed the virtual disk yet.
Now is a good time to mention the file screening feature of File Server Resource Manager. You can have it shut down file sharing and notify you via email when certain file patterns are copied to the file server. Tomorrow I will try to remember to find the link I used to set it up.
@Apothe0sis
Here we go: http://jpelectron.com/sample/Info and Documents/Stop crypto badware before it ruins your day/
They suggest actually deleting the shares and potentially shutting down the server. I made mine just shut down some services (LanmanServer in particular), because we have a DFS Replication/Namespace and I'm not sure about the ramifications of deleting a share. I did find that a couple of the services restart after a couple minutes (I think because our file servers are also domain servers), but it should inhibit the encryption virus enough for us to track it down. The notification email even tells you who it is and exactly what file they're trying to save.
On Server 2012 R2 (and I think flat 2012), FSRM is just a Role you have to install. On older OSes, it is I think in the Resource Kit or a download? It's the same thing that enables quotas, so you may even have it installed. In my testing, it hasn't caused a noticeable performance impact.
Of course, the flaw in the plan is that a user could stumble across one of those filename patterns and continually shut down the file services for everyone, but again, it sends their username in an email.... so you could perhaps go into that person's user drive and delete all the files there and act like you don't know what happened, but that the files are not at all recoverable. I hate users.
So, today this plan paid huuuuuge dividends. I got the email and within 5 minutes I had the guy on the phone to unplug the network cable. No files encrypted or deleted. I mean, other than the ones on his PC, of course. But, like, whatever; it didn't take the file server with it. This dude is a high ranking accountant who has access to all kinds of files all over the server, so I would have had a bad day tomorrow.
hahah oh my god it's like a movie.
"The cable rip it out or we're all dooooooomed!"
Well, yeah, kinda. Like I mentioned in a previous post, a couple weeks ago we had to restore about a third of our 1.6TB file server because of a CryptoLocker variant. This time I didn't.
that CryptoLocker shit is fucking -nasty- I will say that. It caused me to step back up from "basic computer security" to "Great Wall of China" regarding my home PCs.
It is! What sucks is that most of the time, a virus/malware/scamware infection only affects the dumb user who clicked on the thing. With CryptoLocker, they don't even need to be a local admin to screw up the file server for everyone, as long as the PC can run an executable.
What's even worse is that this appears to have happened twice on the same legit website with no prompting with IE (8 and 11). Both users may be lying to me, but they're two people I trust pretty well to not click on and run an exe/plugin installer, so I'm thinking it has something to do with an exploit in Java or Flash.
I've been dealing with a macro issue in Word for the last couple of months, working on it sporadically because it pisses me off that it wasn't working. The macro was simple: print the current page to Tray 2. It's that simple. Everything was working fine until a couple of months ago when one of our squeaky wheels starts getting pissy about the macro, saying that it's broken. Turns out she's right. When you run the macro, it prints Page 1 to Tray 2; you can have the cursor on Page 231 and it will print Page 1.
I finally had it and decided I was going to nail this damn thing down. I poured over all the code and possible options, but they all lead to "This should just fucking work!" And then, by the grace of Jibbers Crabst, I found this thread. Apparently a Word patch in April broke macros that call upon printing to the current page. The workaround is to uninstall KB2965224, but that's not going to happen because users can't be trusted.
But seriously though, how fucking random is it to have a patch break wdPrintCurrentPage.
While I agree that being insensitive is an issue, so is being oversensitive.
0
Mr_Rose83 Blue Ridge Protects the HolyRegistered Userregular
Ok, what am I missing here? I want to delete all files ending in ".bad.log" from all folders in the log directory.
del i:\logs /s /q *.bad.log
I may or may not have deleted all files in that folder this morning.
You needed to do
del /s /q i:\logs\*.bad.log
I think. Separating the path and the file pattern doesn't usually work, but I'm not a Windows command-line expert.
Yeah, that. The command you effectively entered was "del i:\logs" as in the whole folder, except del doesn't do directories so it went after every file in the folder instead. Switches go before arguments and command.com ignores anything on the end of a command that it doesn't understand, as long as everything before that is a recognisable instruction.
I need to find non-security updates that require reboots so that when users really piss me off, I'll just approve it and make them restart... they hate that. It'll be for something stupid, like a change in some Korean font
Le_Goat on
While I agree that being insensitive is an issue, so is being oversensitive.
Backing up your iPod is not my responsibility, so please stop asking me to help you with it on your work computer. *sigh*
Where I work, I would just direct them to the portion of the Computer Facility Usage Policy that they signed when they were hired, where it very clearly points out that you are not allowed to connect non-approved devices to a company PC.
We don't have that policy, because it is "inconvenient" to the end users. I must have forgotten to mention that I basically work at an adult day care.
Yeah, I mean, it's not like we enforce it, but it's nice to have in cases like yours, if only to get people off our backs about something dumb. Our bigger problem is people clicking on bad ads/email attachments and getting hit with an encryption virus that wipes out a third of our files (1.6TB total).
"It said there was a package waiting!"
"They spelled 'package' wrong, they have no way of getting your email address to notify you of that. Were you even expecting a package?"
"No."
This is how I discovered that the two guys that had set up our backup had neglected to include our fileserver in the backups. Through great coincidence I had migrated the files to a larger drive the week before and hadn't reclaimed the virtual disk yet.
Now is a good time to mention the file screening feature of File Server Resource Manager. You can have it shut down file sharing and notify you via email when certain file patterns are copied to the file server. Tomorrow I will try to remember to find the link I used to set it up.
@Apothe0sis
Here we go: http://jpelectron.com/sample/Info and Documents/Stop crypto badware before it ruins your day/
They suggest actually deleting the shares and potentially shutting down the server. I made mine just shut down some services (LanmanServer in particular), because we have a DFS Replication/Namespace and I'm not sure about the ramifications of deleting a share. I did find that a couple of the services restart after a couple minutes (I think because our file servers are also domain servers), but it should inhibit the encryption virus enough for us to track it down. The notification email even tells you who it is and exactly what file they're trying to save.
On Server 2012 R2 (and I think flat 2012), FSRM is just a Role you have to install. On older OSes, it is I think in the Resource Kit or a download? It's the same thing that enables quotas, so you may even have it installed. In my testing, it hasn't caused a noticeable performance impact.
Of course, the flaw in the plan is that a user could stumble across one of those filename patterns and continually shut down the file services for everyone, but again, it sends their username in an email.... so you could perhaps go into that person's user drive and delete all the files there and act like you don't know what happened, but that the files are not at all recoverable. I hate users.
So, today this plan paid huuuuuge dividends. I got the email and within 5 minutes I had the guy on the phone to unplug the network cable. No files encrypted or deleted. I mean, other than the ones on his PC, of course. But, like, whatever; it didn't take the file server with it. This dude is a high ranking accountant who has access to all kinds of files all over the server, so I would have had a bad day tomorrow.
hahah oh my god it's like a movie.
"The cable rip it out or we're all dooooooomed!"
I was watching White Collar the other night and they dumbassedly plugged in a USB drive they got from a criminal hacker (b-b-b-but we scanned it for viruses) into a network connected laptop. They run out of the conference room screaming "OMG everybody unplug your network cables!" and every gets up and pulls the power cable to the monitor.
Backing up your iPod is not my responsibility, so please stop asking me to help you with it on your work computer. *sigh*
Where I work, I would just direct them to the portion of the Computer Facility Usage Policy that they signed when they were hired, where it very clearly points out that you are not allowed to connect non-approved devices to a company PC.
We don't have that policy, because it is "inconvenient" to the end users. I must have forgotten to mention that I basically work at an adult day care.
Yeah, I mean, it's not like we enforce it, but it's nice to have in cases like yours, if only to get people off our backs about something dumb. Our bigger problem is people clicking on bad ads/email attachments and getting hit with an encryption virus that wipes out a third of our files (1.6TB total).
"It said there was a package waiting!"
"They spelled 'package' wrong, they have no way of getting your email address to notify you of that. Were you even expecting a package?"
"No."
This is how I discovered that the two guys that had set up our backup had neglected to include our fileserver in the backups. Through great coincidence I had migrated the files to a larger drive the week before and hadn't reclaimed the virtual disk yet.
Now is a good time to mention the file screening feature of File Server Resource Manager. You can have it shut down file sharing and notify you via email when certain file patterns are copied to the file server. Tomorrow I will try to remember to find the link I used to set it up.
@Apothe0sis
Here we go: http://jpelectron.com/sample/Info and Documents/Stop crypto badware before it ruins your day/
They suggest actually deleting the shares and potentially shutting down the server. I made mine just shut down some services (LanmanServer in particular), because we have a DFS Replication/Namespace and I'm not sure about the ramifications of deleting a share. I did find that a couple of the services restart after a couple minutes (I think because our file servers are also domain servers), but it should inhibit the encryption virus enough for us to track it down. The notification email even tells you who it is and exactly what file they're trying to save.
On Server 2012 R2 (and I think flat 2012), FSRM is just a Role you have to install. On older OSes, it is I think in the Resource Kit or a download? It's the same thing that enables quotas, so you may even have it installed. In my testing, it hasn't caused a noticeable performance impact.
Of course, the flaw in the plan is that a user could stumble across one of those filename patterns and continually shut down the file services for everyone, but again, it sends their username in an email.... so you could perhaps go into that person's user drive and delete all the files there and act like you don't know what happened, but that the files are not at all recoverable. I hate users.
So, today this plan paid huuuuuge dividends. I got the email and within 5 minutes I had the guy on the phone to unplug the network cable. No files encrypted or deleted. I mean, other than the ones on his PC, of course. But, like, whatever; it didn't take the file server with it. This dude is a high ranking accountant who has access to all kinds of files all over the server, so I would have had a bad day tomorrow.
hahah oh my god it's like a movie.
"The cable rip it out or we're all dooooooomed!"
I was watching White Collar the other night and they dumbassedly plugged in a USB drive they got from a criminal hacker (b-b-b-but we scanned it for viruses) into a network connected laptop. They run out of the conference room screaming "OMG everybody unplug your network cables!" and every gets up and pulls the power cable to the monitor.
There's a reason I don't watch network television.
I'm the only one that finds all the hacker romanticism unbereable?
I mean, we have pictures like these on actual newspapers:
Between that and "The Deep Web (tm)", the whole thing seems like everybody thinking that computers work like in the movies. Including those that know better, but pretend otherwise for street cred.
0
Apothe0sisHave you ever questioned the nature of your reality?Registered Userregular
I'm the only one that finds all the hacker romanticism unbereable?
I mean, we have pictures like these on actual newspapers:
Between that and "The Deep Web (tm)", the whole thing seems like everybody thinking that computers work like in the movies. Including those that know better, but pretend otherwise for street cred.
Psshhh, don't try to pretend like you don't hack the Gibson from within the safety of your cyber-punk underground lair filled with illegally-obtained (scantily clad) women, guns, and drugs on a regular basis!
Our tape library pissed its pants, and for some reason the fix was to swap drivers from the Symantec drivers it had been using to IBM drivers (Dell's tape libraries tend to be rebranded IBMs). Ever since then, my backups are failing to verify the ADAM & AD LDS tlog backup of one of my vcenter servers. It's been a fucking month now and I haven't had a verified backup. My daily jobs are on hold (I can pull from VSS thankfully) and the actual file backup portion of the weekly and monthly jobs are completing, but we're required to get the verification or our auditors crawl up our asses.
The really fucking irritating part is that in the itemized job history, the vcenter server shows the ADAM/AD LDS tlog verify begin and complete successfully but the job log itself reports that portion as failed.
I'm the only one that finds all the hacker romanticism unbereable?
I mean, we have pictures like these on actual newspapers:
Between that and "The Deep Web (tm)", the whole thing seems like everybody thinking that computers work like in the movies. Including those that know better, but pretend otherwise for street cred.
Shhhhhhh. You'll blow our cover.
Seidkona on
Mostly just huntin' monsters.
XBL:Phenyhelm - 3DS:Phenyhelm
Hell no. There is only so much you can legally take off. Conversely, you can always put more on during the cold months; it's like being in giant PJs where you feel like you're still in bed.
I find that (at least up here) the people who bitch about the cold the most are the ones trying to look fashionable/cool during it.
While I agree that being insensitive is an issue, so is being oversensitive.
I live somewhere that gets down to about -30C (-25F or so) in winter. by September I'm cursing the heat, but then in January I'm wishing for +30 again. it is all relative =D
Posts
the technology or the nutrient?
Not that it matters, since it is true for both I guess.
That's what we get. How do you feel about a trade?
Chamberlain: (this is a known issue) You need to reboot your computer.
Customer: OK.
(too little time passes for the XP machine she was working on to actually have been restarted)
Customer: It is still doing it!
Chamberlain, who has TeamViewer already running on said XP machine: Give me a second. *remote reboots machine*
Chamberlain: All set.
Customer: Well, it didn't work when I did it.
Well let me think about that no thanks I'm fine.
People assume everyone else is just like they are.
**Migrate certain server to SAN storage, Hot new ESX host**
**Shit breaks**
**Migrate back**
**Shit works**
FFFFFFFFFFFFFFFFFFFFFFFFUUUUUUUUUUUUUUUUUUUUU--
This is a clickable link to my Steam Profile.
I want sidekiq, a ruby gem, to start and restart automatically when apache starts and restarts. My boss suggested running it as a service, and he also wants it to have the same permissions as a certain user. How do I do this?
I think you're progably better off askingg in the Linux thread?
Of course, this is coming from a Windows guy so... I may not be of any help.
Right. I'll go ask them.
hahah oh my god it's like a movie.
"The cable rip it out or we're all dooooooomed!"
This is a clickable link to my Steam Profile.
that CryptoLocker shit is fucking -nasty- I will say that. It caused me to step back up from "basic computer security" to "Great Wall of China" regarding my home PCs.
What's even worse is that this appears to have happened twice on the same legit website with no prompting with IE (8 and 11). Both users may be lying to me, but they're two people I trust pretty well to not click on and run an exe/plugin installer, so I'm thinking it has something to do with an exploit in Java or Flash.
This is a clickable link to my Steam Profile.
del i:\logs /s /q *.bad.log
I may or may not have deleted all files in that folder this morning.
You needed to do
del /s /q i:\logs\*.bad.log
I think. Separating the path and the file pattern doesn't usually work, but I'm not a Windows command-line expert.
I finally had it and decided I was going to nail this damn thing down. I poured over all the code and possible options, but they all lead to "This should just fucking work!" And then, by the grace of Jibbers Crabst, I found this thread. Apparently a Word patch in April broke macros that call upon printing to the current page. The workaround is to uninstall KB2965224, but that's not going to happen because users can't be trusted.
But seriously though, how fucking random is it to have a patch break wdPrintCurrentPage.
Yeah, that. The command you effectively entered was "del i:\logs" as in the whole folder, except del doesn't do directories so it went after every file in the folder instead. Switches go before arguments and command.com ignores anything on the end of a command that it doesn't understand, as long as everything before that is a recognisable instruction.
Nintendo Network ID: AzraelRose
DropBox invite link - get 500MB extra free.
No wait, I can totally stay mad at you.
I was watching White Collar the other night and they dumbassedly plugged in a USB drive they got from a criminal hacker (b-b-b-but we scanned it for viruses) into a network connected laptop. They run out of the conference room screaming "OMG everybody unplug your network cables!" and every gets up and pulls the power cable to the monitor.
There's a reason I don't watch network television.
I mean, we have pictures like these on actual newspapers:
Between that and "The Deep Web (tm)", the whole thing seems like everybody thinking that computers work like in the movies. Including those that know better, but pretend otherwise for street cred.
what happen
Ah, thanks.
Psshhh, don't try to pretend like you don't hack the Gibson from within the safety of your cyber-punk underground lair filled with illegally-obtained (scantily clad) women, guns, and drugs on a regular basis!
Our tape library pissed its pants, and for some reason the fix was to swap drivers from the Symantec drivers it had been using to IBM drivers (Dell's tape libraries tend to be rebranded IBMs). Ever since then, my backups are failing to verify the ADAM & AD LDS tlog backup of one of my vcenter servers. It's been a fucking month now and I haven't had a verified backup. My daily jobs are on hold (I can pull from VSS thankfully) and the actual file backup portion of the weekly and monthly jobs are completing, but we're required to get the verification or our auditors crawl up our asses.
The really fucking irritating part is that in the itemized job history, the vcenter server shows the ADAM/AD LDS tlog verify begin and complete successfully but the job log itself reports that portion as failed.
So in summaray, eat my shit, Backup Exec.
Shhhhhhh. You'll blow our cover.
XBL:Phenyhelm - 3DS:Phenyhelm
Ice Age > melting. Every time.
I find that (at least up here) the people who bitch about the cold the most are the ones trying to look fashionable/cool during it.