Feeds

BOFH: The day the office budget bombed – literally

Explosive network kit Trojan

Application security programs and practises

Episode 19

“And this was the extinguisher here, was it?” the Health and Safety feeb asks.

“That’s the one!” I say.

“And you don’t know of any reason how it came to be filled with diesel instead of water?”

“None!” the PFY lies. “But then it may have been like that when we took the building over!”

Luckily the H&S droid isn’t likely to track through our records to find the drum of diesel the PFY ordered for our non-existent generator a year or so back, however to be on the safe side I make a mental note to change the description in the database to something benign like coffee extract.

And buy a generator to replace the one we sold on eBay. A 350W unit should do the trick.

“So no one checked it?”

“I guess not,” the PFY says, “but I’m pretty sure the testing tag and seal were intact on it. Perhaps you should check with the boss?”

“Yes, I will, once the aftereffects of smoke inhalation have worn off. Now do you know how the fire in his office started in the first place?” 
“I’m not sure,” the PFY says. “He said something about his laptop, so maybe that was it?”

"This laptop?" he asks, holding up a mangled mess of melted plastic, electronics and metal sealed in a large ziplock bag.

"It could be, I guess. Though it looks like the fire has pretty much ruined any chance of finding out if the laptop was responsible given its condition."

"Yes, so I suppose you'd suggest that perhaps the battery had a thermal runaway, which we hear so much about these days, and spontaneously ignited his blotter pad?"
 A perfectly believable situation. Far more believable than, say, a small network-addressable incendiary device inside the boss’s “4-port switch”.

“So if we can go back, did you notice anything unusual beforehand?”

“Aaaaahhhhmmm, let me think," I respond. "We were in his office about 10 minutes beforehand – we had a meeting about how the overtime rates were being cut from double time to 1.25 time, along with the requirement to work public holidays when requested.”

“And the meal allowance,” the PFY adds.

“Yes, that’s right, they dropped the meal allowance for anyone in the office for more than 10 hours in a day.”

“And I assume that you weren’t too happy about this?”

“Oh no – I mean these are tough times and the company has to make savings wherever it can,” I sniff. “So we just realised it was for the good of all, and that there comes a time when individual sacrifices need to be made. No doubt those policy recommendations will be adopted once the boss is back from sick leave.”

“So they weren’t actual policy as yet?”

“No, not just yet. It was part of some recommendations he was working on. I think he’d suggested all contractors should pay for their car park spaces and lunches as well.”

“...and?”

“Well it was all perfectly reasonable. After all, they were struggling to be able to give IT middle management a Christmas bonus and needed to make some savings somewhere – which it looks like they’ve done.”

"So it wasn't started by something far less technical - your assistant for instance?"

"Surely not?" I ask, feigning a lack of knowledge - well, truth be told, I had noticed the pronounced curved scar in the plastic lid debris which can only have been made by a fire axe.  The same type of fire axe the company had removed from the building months ago.  The same type of fire axe that the PFY stole several of prior to the arrival of the removal agents.

"I'll think you'll find it was him!" the H&S geek cries.

Eight steps to building an HP BladeSystem

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.