Feeds

BOFH: Remote access malarkey

Don't mark yourself as a target

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Episode 31

"...And so you can just log in to my machine and look at it whenever you like?" our user asks indignantly.

"Uh-huh," the PFY says, fixing the user's printer settings while he's talking.

"And I don't have to give you permission or anything?"

"I'd have assumed that was implied by ringing the helpdesk?" the PFY says.

"Yes but surely you'd ring me beforehand - as a courtesy, if nothing else!?"

"No, the courtesy bit is me looking up a helpdesk call on a Friday afternoon after three lunchtime pints," the PFY says.

"I... is this the way you normally solve problems?"

"Sometimes," the PFY admits. "Although other times I find that if I leave the call open long enough the user'll go back into their printer settings and remember they stuffed around with the local printer/network printer combo and put it right themselves. But like I say - I'm feeling courteous this afternoon."

"I'd like to speak with your Supervisor!"

"Absolutely," the PFY says (courteously). "Putting you through now!"

>RING<

It never ceases to amaze me how every now and then an otherwise sane user suddenly starts believing that they, their email, and their personal files and instant messages would become so interesting for an administrator that they would forgo the worlds of computer games, movie torrents, porn and piracy simply to peruse their desktop in the hopes of finding something which could only be - let's face it - disappointing.

I mean when the world's your oyster you don't generally settle for fish paste...

"Hello there," I say, handsfree enabled. "IT... Oh... Management, I guess." (For I too have had three pints at lunchtime, plus a couple of extremely generous shots of The Macallan.)

"I was just talking to your systems person and he was most unhelpful."

"Really?" I say. "On a Friday afternoon - after three pints? I'm surprised he answered the phone at all."

"Look, this is serious. He was logged into my machine without my permission."

"Technically," I say, as the Macallan is known to fire up the pedant in me, "that would be the company's machine, however as we're all friends here we should look into it. When exactly did he log into it?"

"Just now."

"He can't have - he's been here the past hour."

"He did it over the network."

"Oh right, remote administration - you must have logged a helpdesk call then?"

"Yes - but surely you'd call me before just rifling through my desktop!"

"No not really," I say. "But give us a minute and I'll just check the job. >clickety< . . . >Pregnant pause while I check my eBay bids, order some more coffee for the espresso machine and fire up Bioshock for some afternoon boredom relief< Yes, a printer config problem. It's been... resolved by the look of it. So no harm done with the remote access."

"But then he could do it at any time!"

"True - but it's relatively simple to stop this from happening if it worries you," I say.

"How?"

"There's two ways that we commonly recommend - one's called shutdown and the other one's not logging a call with the helpdesk. But to be completely honest, shutdown's your best option."

"Why's that then?" he asks, suspiciously.

"Look," I sigh. "It's a Friday afternoon and I can see where this is going, so why don't we just cut to the chase? We get calls from concerned users like yourself upon occasion and I'll tell you what I tell them: When it comes to an administrator's interest in your affairs you're competing against the rich tapestry of the internet - and losing. The only thing that can possibly be done to engage our interest in you is for you to complain about your lack of privacy - because then we start wondering what the hell it is you have that you don't want us to see. And before you know it the administrator concerned has passed you on to someone such as myself whose sole purpose is to keep you talking long enough to fire off a backup of the contents of your hard drive."

>Scrabble<

"Oh it's too late now," I say. "By now my assistant will poring over the contents of your 'My documents' folder, skimming your instant message logs, ferreting through your browser cache and ultimately nosing through your email - which he didn't even need access to your desktop to do in the first place."

>Slam<

>Ring<

"Hello?" I say.

"What's this I hear about you rifling through someone's desktop machine?" the Boss snaps.

"Oh that!" I say. "It was just a remote administration thing - a user had stuffed up their printer settings and my assistant had connected remotely to fix it."

"Without talking to him about it?"

"No - we were just adjusting the settings - same as we did for your machine last week."

"You logged into my machine last week? You didn't ask me!"

"Technically it's not your machine," I say nodding knowingly at the PFY. "However as we're all friends here we should..."

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
IT crisis looming: 'What if AWS goes pop, runs out of cash?'
Public IaaS... something's gotta give - and it may be AWS
Linux? Bah! Red Hat has its eye on the CLOUD – and it wants to own it
CEO says it will be 'undisputed leader' in enterprise cloud tech
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
Hey, what's a STORAGE company doing working on Internet-of-Cars?
Boo - it's not a terabyte car, it's just predictive maintenance and that
Troll hunter Rackspace turns Rotatable's bizarro patent to stone
News of the Weird: Screen-rotating technology declared unpatentable
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.