The Pedant's Guide to Computing Knowledge

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Episode 8

BOFH 2000: Episode 8

And what is this supposed to achieve?" the PFY asks, dubiously looking over a project proposal the boss has handed out with no small amount of gusto and enthusiasm.

"The plan is to lighten the administrative load on us and the new Helldesk types by training up the most proficient computer user in each area to act as a first-line-of-defence type, who can eliminate all the simple day-to-day problems that plague us so much."

"You think it'll work?"

"About as likely as an unplagiarised Look-and-Feel interface."

"So you don't think the candidates are the full quid?"

"48p at best."

"Well I spo.."

"They couldn't retain WATER without studying first.."

"Yes, but..."

"They think firewalls are used in chimneys!"

"Yes, and you'l..."

"That only Jenny Craig makes thin clients..."


"The only hardware they've ever handled's in the bedroom - and even that was bug-ridden. They think that Linux is a character from Charlie Brown.. BZZERT

The PFY, spotting a potential re-entrant mental loop, resets me with the help of his trusty cattle-prod connectivity tester. (Which he'll regret later)

"So, what'll we teach them?" he asks thoughtfully..

"The very basics - how to put the lid back on a PC, get the CAPS LOCK key off, where the Power switch is, what a network cable looks like - that sort of thing."

"I see," he says, looking as doubtful as I feel.

. . .

"Now can anyone tell me the most important thing about computing safety?" I ask, looking around the audience to see if any of the assembled people has any answers. And of course WHENEVER you have one of these sessions there's always some complete TWAT (pardon my Russian) in the audience who was programming an Apple ][E in his nappies who has a thousand and one pointless, irrelevant and meandering stories to tell you about the foibles of the 6502 instruction set. And when he's not doing that, he's correcting your monologue with snippets from the 'Pedant's Guide to Computing Knowledge'."

Ok, so I'm just slightly bitter.

"Bound to be the power supply!" today's installation of TWAT informs us. "Lots of voltage in a switched mode power supply, stacked up in a electrolytic capacitor and able to be discharged up to an hour after a device is unplugged from the wall."

See what I mean?

"No!" I cry, "But we'll come back to that later. For now, we'll talk about the SECOND most important thing about computing safety, which is to secure your machine from unwanted accesses. Remember, a secure machine is a safe machine! Now how would we choose a good password?"

"A pseudo random string of alphanumerics and symbols with mixed case," TWAT blurts, before anyone's had a chance to take in the question.

Because of the technical nature of the response, a couple of the onlookers are fooled into nodding their head in agreement.

"NO!" I cry enthusiastically, adding a hint of conspiracy into the pot. "That's just what they'd be expecting you to do!"

"What who'd be expec..?" my Royal pain asks.

"Industrial Spies!" I comment, lowering my voice "Believe it or not, industrial espionage exists - even at our paltry level of commerce. Sometimes it's just information they want - sometimes they want to disrupt our processes!

Why just last week three people in accounting came to work to find their hard disks completely erased and all the DIMM chips removed from their machines!"

A gasp of horror flows around the room, even though 98% of them wouldn't know a DIMM if they found one in their coffee.

"But they'd have to get in the building to steal DIMMs, so your password wouldn't matter," TWAT comments "They could take your harddrive away and just examine the contents. With the new magnetic aura detection they could read the files that you'd previously erased, even if you used an aggressive overwriting packa.."

RIGHT! I've had enough!

"You're right, of course," I cry, pandering to the whole self-worth experiment underway in front of me, "which is why I've asked for a massive increase in the security budget! Anyway, that's enough about security, now onto hardware. Memory Errors! Can anyone tell me the recommended way to reseat the DIMMs in this box here?"

No prizes for guessing who's up, complete with wrist strap (which he brought with him - sadder still) before I can finish the sentence.

"Well on this one you turn the power off at that wall >CLICK< then flip the key to the unlock position like so >SNICK< push the two buttons at the back like this >CLICK< then lift the cover up and towards you, and Bob's your second cousin."

"Right, and now the reseating?"

"Simple, these are the DIMMs here, and you reseat them by taking them out like so >>ZZZZZZZzzzzzzzzzzzz...<<

"Now what has he done wrong here?" I ask the fireworks spectators.


"That's right, he's forgotten to check for a UPS unit in this cardboard box marked 'Printer Paper'!"

>>ZZZZZZZZZZZZZZZZZZZZZeeeeeeerrrrrrrrrrrrrr... <<

"And he failed to notice that someone's dropped an unfolded paper clip into the machine which has, by a one-in-a-million chance got connected between the Phase line in the power supply and the DIMM chip!"

. . .

Of course I switch the UPS off, eventually... ..and he's still bloody going!!

"I can't believe that UPS unit isn't isolated from ground!" he gasps "It must be faulty - someone should fill out a >>ZZZZZZZZZZEEERRRRT!<<

"Woopsy," I cry, as my little helper plops to the ground in a daze. "Now, can anyone tell me the most important thing about Computing Safety?" I ask.

"Not to piss you off?" someone murmurs from the back.

And who says you can't teach people things? ®

BOFH is owned by Simon Travaglia: don't mess with his copyright

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Docker's app containers are coming to Windows Server, says Microsoft
MS chases app deployment speeds already enjoyed by Linux devs
Intel, Cisco and co reveal PLANS to keep tabs on WORLD'S MACHINES
Connecting everything to everything... Er, good idea?
SDI wars: WTF is software defined infrastructure?
This time we play for ALL the marbles
'Urika': Cray unveils new 1,500-core big data crunching monster
6TB of DRAM, 38TB of SSD flash and 120TB of disk storage
Facebook slurps 'paste sites' for STOLEN passwords, sprinkles on hash and salt
Zuck's ad empire DOESN'T see details in plain text. Phew!
'Hmm, why CAN'T I run a water pipe through that rack of media servers?'
Leaving Las Vegas for Armenia kludging and Dubai dune bashing
Windows 10: Forget Cloudobile, put Security and Privacy First
But - dammit - It would be insane to say 'don't collect, because NSA'
Oracle hires former SAP exec for cloudy push
'We know Larry said cloud was gibberish, and insane, and idiotic, but...'
prev story


Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.