Feeds

BOFH: A safe bet

Bet your ass they wish to proceed

  • alert
  • submit to reddit

Security for virtualized datacentres

Episode 1

"It's a Christmas miracle!" the PFY gasps, opening the safe door after our extended Christmas break to find... nothing.

"Hardly," I say, reaching down to the floor of the safe to retrieve a business card from amongst the coins and cards than no doubt fell out of the Boss's wallet. "Secure Safe Services. Protected Storage experts. 24 Hr on call."

"He had someone in to open the door!" the PFY swoons.

"Yes they did," our Boss snaps from the doorway behind us. "I managed to reach Directory Enquiries and get an answer before my cellphone battery died – and even more unbelievably the first person I called was willing to come out to sort the problem out. And I think you know what this means..."

"I won't be needing the roll of carpet, the company van and half a can of odour neutralising air freshener?" the PFY queries.

"No..."

"That the tape safe isn't airtight like the manufacturer claimed?" I ask. "Nor does it block radio signals."

"Yes... But no."

"What then?"

"You're for the high jump!" the Boss snaps. "That's attempted murder!"

"What is?" I ask

"Trying to lock me in the safe over the holidays!"

"Nonsense!" the PFY says. "You shut yourself in the safe after having heaps of lagers and sending out that email about playing hide-and-seek on the last day."

"What email?"

"Trust me," the PFY says. "In no time at all there'll be email messages from you to the IT staff about a hide-and-seek marathon on the last day."

"And if you're not careful there'll be emails from you to the HR staff about a hide-the-sausage marathon on the last day as well!" I add.

"People would have said something!” the boss snaps back.

"Not if they didn't know they'd got a message. Like if it's sitting in their Junk Email folder. Until they get a message from the systems people asking them to check it for messages 'that might have got misdelivered over the break'.”

"There's no proof!"

"Not yet - but then we're not talking court-of-law here, we're talking court-of-public-opinion. In a court of law they're looking for proof that you definitely did something, whereas in the court-of-public-opinion they're just looking for a hint that you might have done something – to fuel the rumour of you being a perverted sleaze with a fetish for enclosed spaces..."

"There's no proof I sent the messages, though."

"Oh you mean like computer forensics?" I say. "Then you haven't seen the PFY's tools for tampering with timestamps and injecting questionable phrases and image data into unallocated regions of a hard drive. Not to mention the one for manipulating the Exchange server to insert messages at certain times – from target machines. They're works of art. Honestly, as 'evidence generation' goes it's so compelling you'll be wondering yourself if you don't have some hidden tendencies that need a bit of over-voltage to sort out.."

"So... what are you proposing?"

“I'm proposing we put all these 'misunderstandings' behind us and start the year with a clean slate. We forget all that happened last year and start afresh this year."

"I... suppose so," the Boss concedes.

“And so I assume that you'll have to make some revisions to the statement that you no doubt made to security at the end of last year?”

“I... Yes.”

“Something along the lines of a terrible misunderstanding when you were feeling a little tired and emotional and that you're really sorry if you made any unfounded allegations out of jealousy and spite.”

“I... OK.”

“Now, perhaps?” I say, picking up the phone receiver and handing it to him

Five minutes later the call is made. With a little bit of help from the PFY and myself the Boss manages to concoct a story to appeal to Security's neadertal intellect (ie an EastEnders episode) about a cocktail of fear, jealousy and high alcohol lager forcing him to make some rash statements that now, in the light of day, he regrets.

“So that's it then?” the Boss says. “No fake email messages?”

“Scout's honour. In fact, I'm feeling so good about it, I won't even keep all the crap you dropped in the bottom of the tape safe last year.”

“Ah yes, that. I'd better get it as it has my gym membersh... >nudge< >SLAM<

“I thought you said start the year with a clean slate?” the PFY asks.

“The year started two weeks ago. Now gimme a hand wrapping the safe in tinfoil before Directory Enquiries can answer...”

Providing a secure and efficient Helpdesk

More from The Register

next story
IBM storage revenues sink: 'We are disappointed,' says CEO
Time to put the storage biz up for sale?
'Hmm, why CAN'T I run a water pipe through that rack of media servers?'
Leaving Las Vegas for Armenia kludging and Dubai dune bashing
Facebook slurps 'paste sites' for STOLEN passwords, sprinkles on hash and salt
Zuck's ad empire DOESN'T see details in plain text. Phew!
Windows 10: Forget Cloudobile, put Security and Privacy First
But - dammit - It would be insane to say 'don't collect, because NSA'
CAGE MATCH: Microsoft, Dell open co-located bit barns in Oz
Whole new species of XaaS spawning in the antipodes
VMware's tool to harden virtual networks: a spreadsheet
NSX security guide lands in intriguing format
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.