Feeds

Just when you though BOFH has disappeared…

Try this simple test

  • alert
  • submit to reddit

Top three mobile application threats

Episode 39 BOFH 2000: Episode 40

It's been a while and rumours are that you're losing your edge! Do you still know what a full set of service manuals is, and how hard to hit a user with them when they're annoying you?

This simple test may help you get your edge back...

1. You get into work at 8:17am to find someone waiting for you impatiently. Everyone knows you start at 8:30am after you've finished the paper, but they're new and you feel sorry for them. You:
A. Sort out their problem
B. Tell them about your normal start time, then sort out their problem
C. Stick to Routine so as not to upset the rest of the day
D. Read the paper till 9:00am, just to make a point
E. Educate them on how long "just a few minutes" is using only a trip to the Computer room and the Halon system as teaching aids.

2. A user who's been pissing around with the internals of their desktop machine "just to find out how it ticks" would be called:
A. A Hacker
B. A Tinkerer
C. A Cracker
D. A Techie
E. An Ambulance. Eventually

3. The movie about someone who pissed off their System Administrator was called:
A. The Net
B. Matrix
C. Mary Poppins
D. Pride and Prejudice
E. Death Wish II

4. You're at a curry house with your boss, a salesperson and one of the beancounters. Your greatest concern is:
A. The beancounter stuffing up the excellent deal you've just got
B. Your breath being whiffy after lunch
C. Getting back to the office on time
D. How many Cold Kingfishers you can get down in an hour
E. How to slip a fistful of chopped chilli into the Beancounter's meal with no-one noticing

5. Health and Safety droids visit your workplace and say it constitutes an extreme health hazard. They're obviously:
A. Talking about the sharp edges on the metal cabinets
B. Thinking about the open powersupply on the box you're mending
C. Wondering about lifted floor tiles in the computer room
D. Shocked about the lack of external ventilation
E. Unaware that you swapped the "Door Release" and "Halon Release" buttons just before they entered the computer room.

6. It's your favourite engineer's birthday and you're going to get him the present he most wants in the whole world, which is:
A. A demagnetised, insulated shaft, posidrive subminiature screwdriver with his name on it
B. A Ladybird beginners guide to electronics book
C. A Windows for Dummies Book
D. A service guide for the equipment he's supposed to be able to fix
E. A bigger hammer.

7. It's the third time a user has contacted in the same week to say they've forgotten their password. You:
A. Change it for them
B. Change it to something like "Iloveanalsexooohyes"
C. Do the same as B, then disable their ability to change it
D. Do the same as C, then fudge their login window to echo the password to screen
E. Do the same as D, then get out the soldering iron and your Duffer's Guide to Tattooing book.

8. Your boss comes in to talk to you about the amount of time you spend surfing the web. You:
A. Admit that you may be rather excessive
B. Do the same as A, but say it's all work related
C. Deny everything
D. Deny everything, and finger someone else for the traffic
E. Admit it, say you promise to browse more, then flash the smutty-cache log info about, saying you'll name names.

9. Someone has lost the keys to the tape safe. You're extremely concerned because:
A. You'll have nowhere to secure the backups
B. You won't be able to get to the backups if they're needed
C. You didn't know there *were* keys to the tape safe
D. The buyer is going to be here any day!
E. The contents of your liquor cabinet is up for grabs!!!

10. You're at a user group meeting when someone questions your frequent use of high voltage as a fault finding tool.
A. You agree never to use it again
B. You agree only to use it via a "Megger" tester
C. Do the same as B, and never on Data circuits
D. Do the same as C, nor on phone circuits as well
E. Do the same as B and C, so long as testicles are still included

But where's the key?

Like most instructional exams, there's no answer, only answers you should be struck about the head with a sockful of your own dung for using. Unless you're a certified MCSE person, in which case the answer to this and every other exam will be supplied to you in easily digestible chunks.

Thank you for calling Bastard Support. You are caller number 473. ®

3 Big data security analytics techniques

More from The Register

next story
Sorry London, Europe's top tech city is Munich
New 'Atlas of ICT Activity' finds innovation isn't happening at Silicon Roundabout
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.