Feeds

BOFH: In distributed denial

That's not where you're supposed to spread the peanut butter

  • alert
  • submit to reddit

Application security programs and practises

It's working fine for me

Yes, yes, childish fun – but if you’re wanting to troll through the Boss’ private documents without suspicion then “Transient HID instability” is almost certain to get him to deliver it to you in no time – no questions asked.

"The network's working fine for me," I say "Look, eBay comes up no probs."

"I'm not the only one having problems!"

"Maybe it’s a distributed distributed denial of service attack from the inside?" I gasp.

"What do you mean?" the Boss asks in hushed tones. "That someone here's trying to upset our network access?"

"It's not unheard of.”

"You really think it’s internal?"

"It only appears to be affecting our department," I lie, "so it's probably someone on the same distribution switch as us. In the IT department."

"How would we know who?" the Boss asks.

"You mean personally or technically?"

"I... Personally?"

"Your average internal denial of service attacker is a disenfranchised member of a workplace community" the PFY monotones. "Easily led, they often believe their activity is justified because of an unaddressed workplace issue which has left them feeling underappreciated or unrespected – you know, like the blocking of the Ukrainian Peanut Butter Girls website."

“IT WAS THE BLOODY MACHINE!” the Boss says.

"Perhaps we should narrow it down from the entire IT department" I suggest.

"Yeah. It'll be the one who stays at his desk at lunchtime when everyone else leaves," the PFY predicts.

. . . That lunchtime after the PFY's given thebox.bz another good bashing . . .

"So it's that new bloke on the helpdesk!" the Boss snaps decisively.

"No!" the PFY says, in a tone of disbelief so real you’d almost think that the PFY had forgotten that the aforementioned geek had taken double helpings of onion bhajis in the cafeteria yesterday, leaving the PFY with none.

"Then who is it?" the Boss asks.

"No, I didn't mean it wasn't the bloke on the helpdesk," the PFY says, in tones so reasonable it would be hard to believe that he’d rung that call in about the problem that happens at exactly 12:34 every day – and could the helpdesk guy wait for him to call back...

"So it IS him?"

"Bound to be"

"Can't you just check the network switch to see...”

“No need,” the PFY says as I step behind one of the desks in Mission Control. “We’ve put a wireless camera in the pot plant in the helpdesk room…”

Moments later, in a million-to-one chance we catch the “hacker” choosing that moment to browse to a blackhat website and investigate DDoS software.

And the rest is history - the arrival of Security, the pathetic excuses, the tears, the recrimination, the Boss emailing the news of the dismissal to us all under the subject “I’ve got a tiny wiener”…

It’s all good fun.

Eight steps to building an HP BladeSystem

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.