There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

NABDad ,

It’s it too soon to say, “letting Crowdstrike push updates to all your windows workstations and servers”

mozz ,
@mozz@mbin.grits.dev avatar

Startup in a rented house in a residential neighborhood

“Router” was an old PC running Linux with a few network cards, with no case, with a household fan pointed at it to keep it cool

Loose ethernet cables and little hubs everywhere

Every PC was its own thing and some people were turbo nerds. I had my Linux machine with its vertical monitor; there were many Windows machines, a couple Macs, servers and 2 scrounged Sun workstations also running Linux

No DHCP, pick your own IP and tell the IT guy, which was me, and we’ll set you up. I had a little list in my notebook.

It was great days my friends

We went out of business; no one was shocked

Vanth ,
@Vanth@reddthat.com avatar

Engineering company with one big shared drive with a simple file folder structure. Drawings were in a folder with a text file up top that said something like “do not modify without Ed’s approval”, Ed being the senior most engineer. Everyone was given the same access levels to read/write/modify, but because the note said not to, no one did. (They totally did change files without Ed’s approval).

We had some work that required being authorized to work in the US and one project where we had to be a US citizen, not just green card or work visa or whatever. The check? None, you got default access to the entire drive unless you had an accent. I only ever saw people with accents get questioned about their citizenship.

Tolookah ,

Is ECO an Ed change order?

Vanth ,
@Vanth@reddthat.com avatar

Dagnabbit, how did we not see this before?

calamityjanitor ,

My partner worked for a local council. They reset your password every 90 days which prevented you from logging in via the VPN remotely. To fix it you’d call IT and they’ll demand you tell them your current password and new password so they can change it themselves on your behalf.

Even worse, requesting a work iphone meant filling out an IT support ticket. So that IT could set up your phone for you, the ticket demanded your work domain username and password, along with your personal apple account username and password.

Xaphanos ,

My current job.

Many SQL servers use scripts that run as domain administrator. With the password hard coded in.

Several of the various servers are very old. W2K, 2003, 2008. SQL server, too.

Several of the users run reports via rdp to the SQL server - logging in as domain admin.

Codebase is a mashup of various dev tools: .net, asp, Java, etc.

Fax server software vendor has been out of business for a decade. Server hardware is 20 years old. Telecom for fax is a channelized PRI carrying POTS - and multiport modem cards.

About a 3rd of the ethernet runs in the office have failed.

Office pcs are static IP. Boss says that’s more secure.

We process money to/from the Fed.

lemmyseizethemeans ,

Ah the sweet security that is a static IP lol

Blizzard ,

My current company has a script that runs and deletes files that haven’t been modified for two years. It doesn’t take into account any other factors, just modification date. It doesn’t aks for confirmation and doesn’t even inform the end user about.

DeathbringerThoctar ,
Kimjongtooill ,

You should write a script to touch all the files before their script runs.

Blizzard ,

Thought about it but I use modification date for sorting to have the stuff I’ve recently worked on on top. I instead keep the files where the script isn’t looking. The downside is they are not backed up so I might potentially lose them but if I don’t do that, then I’ll lose them for sure…

Reverendender ,

Have you…called attention to this at all?

Perhyte ,

You don’t actually have to set all the modification dates to now, you can pick any other timestamp you want. So to preserve the order of the files, you could just have the script sort the list of files by date, then update the modification date of the oldest file to some fixed time ago, the second-oldest to a bit later, and so on.

You could even exclude recently-edited files because the real modification dates are probably more relevant for those. For example, if you only process files older than 3 months, and update those starting from “6 months old”^1^, that just leaves remembering to run that script at least once a year or so. Just pick a date and put a recurring reminder in your calendar.

^1^: I picked 6 months there to leave some slack, in case you procrastinate your next run or it’s otherwise delayed because you’re out sick or on vacation or something.

LazaroFilm ,
@LazaroFilm@lemmy.world avatar

Have a script that makes a copy of all files that are 1.9 years old into a separate folder.

MNByChoice ,

Create a series of folders labeled with dates. Every day copy the useful stuff to the new folder. Every night change modified dates on all files to current date.

Kalkaline ,
@Kalkaline@leminal.space avatar

That’s the worst foresight I think I’ve ever heard of, you might as well make that 3 months if you’re just going to trash thousands of labor hours on those files.

BearOfaTime ,

Put all your files in a single zip file. No compression. Since Windows handles zip files like folders, you can work like normal. And the zip file will always have a recent time stamp.

biscuitswalrus ,

Seems like you should submit a change request with your fixes?

j4k3 ,
@j4k3@lemmy.world avatar

Coffee shop open WiFi on the same network as the main retail central point of sale system server for several stores.

biscuitswalrus ,

Transport layer security should mean this shouldn’t matter. A good POS shouldn’t rely on a secure network, the security should already be built in cyptographically at the network session layer. Anything else would still have the same risk vector, just a lower chance of happening.

In fact many POS systems happily just take a 4g/5g sim card because it doesn’t matter what network they’re on.

some_guy ,

We make users change their passwords every 90d. And log them out of their devices once a week. I don’t think this adds any security at all. It just reduces productivity (IMO).

Godort , (edited )

Not only does password rotation not add to security, it actually reduces it.

Assuming a perfect world where users are using long randomly generated strong passwords it’s a good idea and can increase security. However, humans are involved and it just means users change their passwords from “Charlie1” to “Charlie2” and it makes their passwords even easier to guess. Especially if you know how often the passwords change and roughly when someone was hired.

Ideally, your users just use a password manager and don’t know any of their credentials except for the one to access that password manager.

If they need to manually type them in, password length should be prioritized over almost any other condition. A full sentence makes a great unique password with tons of entropy that is easy to remember and hard to guess.

mannycalavera ,
@mannycalavera@feddit.uk avatar

IBM

/thread

Bytemeister ,

All Macs

foggy ,

I have posted about this before. I’m pretty sure I win.

I’m not going to name names. I worked for a company, three of their clients include the United States Air Force, the United States army, and the United States Navy. They also have a few thousand other clients, private sector, public, and otherwise. Other nation states services as well.

I worked for this company quite recently, which should make what I’m about to tell you all the more alarming. I worked for them in 2021.

Their databases were ProgressABL. I linked it because if you’re younger than me, there’s a slim chance in hell you’ve ever heard of it. I hadn’t. And I’m nearing 40.

Their front end was a bunch of copy/pasted JavaScript, horribly obfuscated with no documentation and no comments. Doing way more than is required.

They forced clients to run windows 7, an old version of IE, all clients linked together, to us, in the most hilariously insecure 1990s-ass way imaginable, through tomcat instances running on iis on all their clients machines.

They used a wildcard SSL for all of their clients to transact all information.

That SSL was stored on our local FTP server. We had ports forwarded to the internet at large.

The password for that ftp server was 100% on lists. It was rotated, but all of the were simple as fuck.

I mean, “Spring2021”. Literally. And behind that? The key to deobfuscate all traffic for all of our clients!!

The worst part was that we offered clients websites, and that’s what I worked on. I had to email people to have them move photos to specific directories to get them to stop failing to load, because I didn’t have clearance to the servers where we stored our clients photos.

We had legit secure servers. We used them for photos. We left the keys to the fucking city in the prize room of a maze a 12 year old could solve.

Holy shit.

reallykindasorta ,

My coworkers and I have to remap the network drives to our office wide file systems 2-3 times a day to access the files. This is the main file storage(some teams have moved some stuff to google drive but that doesn’t work for sensitive info).

philpo ,

Saw a mid size clinic where the server was also the personal desktop of the boss - who also used the domain admin user as his main user account. His reasoning was that he needed to see “everything” his employees did and that none must come “above him” IT wise.

And before I forget it:The machine was in his office where he still was seeing patients and where often patients were left unattended - without him locking the machine.

Lag ,

No IT at all.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • [email protected]
  • random
  • lifeLocal
  • goranko
  • All magazines