Feeds

BOFH: A safe bet

Bet your ass they wish to proceed

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

Episode 1

"It's a Christmas miracle!" the PFY gasps, opening the safe door after our extended Christmas break to find... nothing.

"Hardly," I say, reaching down to the floor of the safe to retrieve a business card from amongst the coins and cards than no doubt fell out of the Boss's wallet. "Secure Safe Services. Protected Storage experts. 24 Hr on call."

"He had someone in to open the door!" the PFY swoons.

"Yes they did," our Boss snaps from the doorway behind us. "I managed to reach Directory Enquiries and get an answer before my cellphone battery died – and even more unbelievably the first person I called was willing to come out to sort the problem out. And I think you know what this means..."

"I won't be needing the roll of carpet, the company van and half a can of odour neutralising air freshener?" the PFY queries.

"No..."

"That the tape safe isn't airtight like the manufacturer claimed?" I ask. "Nor does it block radio signals."

"Yes... But no."

"What then?"

"You're for the high jump!" the Boss snaps. "That's attempted murder!"

"What is?" I ask

"Trying to lock me in the safe over the holidays!"

"Nonsense!" the PFY says. "You shut yourself in the safe after having heaps of lagers and sending out that email about playing hide-and-seek on the last day."

"What email?"

"Trust me," the PFY says. "In no time at all there'll be email messages from you to the IT staff about a hide-and-seek marathon on the last day."

"And if you're not careful there'll be emails from you to the HR staff about a hide-the-sausage marathon on the last day as well!" I add.

"People would have said something!” the boss snaps back.

"Not if they didn't know they'd got a message. Like if it's sitting in their Junk Email folder. Until they get a message from the systems people asking them to check it for messages 'that might have got misdelivered over the break'.”

"There's no proof!"

"Not yet - but then we're not talking court-of-law here, we're talking court-of-public-opinion. In a court of law they're looking for proof that you definitely did something, whereas in the court-of-public-opinion they're just looking for a hint that you might have done something – to fuel the rumour of you being a perverted sleaze with a fetish for enclosed spaces..."

"There's no proof I sent the messages, though."

"Oh you mean like computer forensics?" I say. "Then you haven't seen the PFY's tools for tampering with timestamps and injecting questionable phrases and image data into unallocated regions of a hard drive. Not to mention the one for manipulating the Exchange server to insert messages at certain times – from target machines. They're works of art. Honestly, as 'evidence generation' goes it's so compelling you'll be wondering yourself if you don't have some hidden tendencies that need a bit of over-voltage to sort out.."

"So... what are you proposing?"

“I'm proposing we put all these 'misunderstandings' behind us and start the year with a clean slate. We forget all that happened last year and start afresh this year."

"I... suppose so," the Boss concedes.

“And so I assume that you'll have to make some revisions to the statement that you no doubt made to security at the end of last year?”

“I... Yes.”

“Something along the lines of a terrible misunderstanding when you were feeling a little tired and emotional and that you're really sorry if you made any unfounded allegations out of jealousy and spite.”

“I... OK.”

“Now, perhaps?” I say, picking up the phone receiver and handing it to him

Five minutes later the call is made. With a little bit of help from the PFY and myself the Boss manages to concoct a story to appeal to Security's neadertal intellect (ie an EastEnders episode) about a cocktail of fear, jealousy and high alcohol lager forcing him to make some rash statements that now, in the light of day, he regrets.

“So that's it then?” the Boss says. “No fake email messages?”

“Scout's honour. In fact, I'm feeling so good about it, I won't even keep all the crap you dropped in the bottom of the tape safe last year.”

“Ah yes, that. I'd better get it as it has my gym membersh... >nudge< >SLAM<

“I thought you said start the year with a clean slate?” the PFY asks.

“The year started two weeks ago. Now gimme a hand wrapping the safe in tinfoil before Directory Enquiries can answer...”

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.