Feeds

BOFH 1: TWAT O

The Pedant's Guide to Computing Knowledge

  • alert
  • submit to reddit

Intelligent flash storage arrays

Episode 8

BOFH 2000: Episode 8

And what is this supposed to achieve?" the PFY asks, dubiously looking over a project proposal the boss has handed out with no small amount of gusto and enthusiasm.

"The plan is to lighten the administrative load on us and the new Helldesk types by training up the most proficient computer user in each area to act as a first-line-of-defence type, who can eliminate all the simple day-to-day problems that plague us so much."

"You think it'll work?"

"About as likely as an unplagiarised Look-and-Feel interface."

"So you don't think the candidates are the full quid?"

"48p at best."

"Well I spo.."

"They couldn't retain WATER without studying first.."

"Yes, but..."

"They think firewalls are used in chimneys!"

"Yes, and you'l..."

"That only Jenny Craig makes thin clients..."

"U.."

"The only hardware they've ever handled's in the bedroom - and even that was bug-ridden. They think that Linux is a character from Charlie Brown.. BZZERT

The PFY, spotting a potential re-entrant mental loop, resets me with the help of his trusty cattle-prod connectivity tester. (Which he'll regret later)

"So, what'll we teach them?" he asks thoughtfully..

"The very basics - how to put the lid back on a PC, get the CAPS LOCK key off, where the Power switch is, what a network cable looks like - that sort of thing."

"I see," he says, looking as doubtful as I feel.

. . .

"Now can anyone tell me the most important thing about computing safety?" I ask, looking around the audience to see if any of the assembled people has any answers. And of course WHENEVER you have one of these sessions there's always some complete TWAT (pardon my Russian) in the audience who was programming an Apple ][E in his nappies who has a thousand and one pointless, irrelevant and meandering stories to tell you about the foibles of the 6502 instruction set. And when he's not doing that, he's correcting your monologue with snippets from the 'Pedant's Guide to Computing Knowledge'."

Ok, so I'm just slightly bitter.

"Bound to be the power supply!" today's installation of TWAT informs us. "Lots of voltage in a switched mode power supply, stacked up in a electrolytic capacitor and able to be discharged up to an hour after a device is unplugged from the wall."

See what I mean?

"No!" I cry, "But we'll come back to that later. For now, we'll talk about the SECOND most important thing about computing safety, which is to secure your machine from unwanted accesses. Remember, a secure machine is a safe machine! Now how would we choose a good password?"

"A pseudo random string of alphanumerics and symbols with mixed case," TWAT blurts, before anyone's had a chance to take in the question.

Because of the technical nature of the response, a couple of the onlookers are fooled into nodding their head in agreement.

"NO!" I cry enthusiastically, adding a hint of conspiracy into the pot. "That's just what they'd be expecting you to do!"

"What who'd be expec..?" my Royal pain asks.

"Industrial Spies!" I comment, lowering my voice "Believe it or not, industrial espionage exists - even at our paltry level of commerce. Sometimes it's just information they want - sometimes they want to disrupt our processes!

Why just last week three people in accounting came to work to find their hard disks completely erased and all the DIMM chips removed from their machines!"

A gasp of horror flows around the room, even though 98% of them wouldn't know a DIMM if they found one in their coffee.

"But they'd have to get in the building to steal DIMMs, so your password wouldn't matter," TWAT comments "They could take your harddrive away and just examine the contents. With the new magnetic aura detection they could read the files that you'd previously erased, even if you used an aggressive overwriting packa.."

RIGHT! I've had enough!

"You're right, of course," I cry, pandering to the whole self-worth experiment underway in front of me, "which is why I've asked for a massive increase in the security budget! Anyway, that's enough about security, now onto hardware. Memory Errors! Can anyone tell me the recommended way to reseat the DIMMs in this box here?"

No prizes for guessing who's up, complete with wrist strap (which he brought with him - sadder still) before I can finish the sentence.

"Well on this one you turn the power off at that wall >CLICK< then flip the key to the unlock position like so >SNICK< push the two buttons at the back like this >CLICK< then lift the cover up and towards you, and Bob's your second cousin."

"Right, and now the reseating?"

"Simple, these are the DIMMs here, and you reseat them by taking them out like so >>ZZZZZZZzzzzzzzzzzzz...<<

"Now what has he done wrong here?" I ask the fireworks spectators.

>>ZzzzzzZZzZZZZZZZZZZZZZZZZ<

"That's right, he's forgotten to check for a UPS unit in this cardboard box marked 'Printer Paper'!"

>>ZZZZZZZZZZZZZZZZZZZZZeeeeeeerrrrrrrrrrrrrr... <<

"And he failed to notice that someone's dropped an unfolded paper clip into the machine which has, by a one-in-a-million chance got connected between the Phase line in the power supply and the DIMM chip!"

. . .

Of course I switch the UPS off, eventually... ..and he's still bloody going!!

"I can't believe that UPS unit isn't isolated from ground!" he gasps "It must be faulty - someone should fill out a >>ZZZZZZZZZZEEERRRRT!<<

"Woopsy," I cry, as my little helper plops to the ground in a daze. "Now, can anyone tell me the most important thing about Computing Safety?" I ask.

"Not to piss you off?" someone murmurs from the back.

And who says you can't teach people things? ®

BOFH is owned by Simon Travaglia: don't mess with his copyright

Internet Security Threat Report 2014

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?