Feeds

BOFH: The day the office budget bombed – literally

Explosive network kit Trojan

3 Big data security analytics techniques

Episode 19

“And this was the extinguisher here, was it?” the Health and Safety feeb asks.

“That’s the one!” I say.

“And you don’t know of any reason how it came to be filled with diesel instead of water?”

“None!” the PFY lies. “But then it may have been like that when we took the building over!”

Luckily the H&S droid isn’t likely to track through our records to find the drum of diesel the PFY ordered for our non-existent generator a year or so back, however to be on the safe side I make a mental note to change the description in the database to something benign like coffee extract.

And buy a generator to replace the one we sold on eBay. A 350W unit should do the trick.

“So no one checked it?”

“I guess not,” the PFY says, “but I’m pretty sure the testing tag and seal were intact on it. Perhaps you should check with the boss?”

“Yes, I will, once the aftereffects of smoke inhalation have worn off. Now do you know how the fire in his office started in the first place?” 
“I’m not sure,” the PFY says. “He said something about his laptop, so maybe that was it?”

"This laptop?" he asks, holding up a mangled mess of melted plastic, electronics and metal sealed in a large ziplock bag.

"It could be, I guess. Though it looks like the fire has pretty much ruined any chance of finding out if the laptop was responsible given its condition."

"Yes, so I suppose you'd suggest that perhaps the battery had a thermal runaway, which we hear so much about these days, and spontaneously ignited his blotter pad?"
 A perfectly believable situation. Far more believable than, say, a small network-addressable incendiary device inside the boss’s “4-port switch”.

“So if we can go back, did you notice anything unusual beforehand?”

“Aaaaahhhhmmm, let me think," I respond. "We were in his office about 10 minutes beforehand – we had a meeting about how the overtime rates were being cut from double time to 1.25 time, along with the requirement to work public holidays when requested.”

“And the meal allowance,” the PFY adds.

“Yes, that’s right, they dropped the meal allowance for anyone in the office for more than 10 hours in a day.”

“And I assume that you weren’t too happy about this?”

“Oh no – I mean these are tough times and the company has to make savings wherever it can,” I sniff. “So we just realised it was for the good of all, and that there comes a time when individual sacrifices need to be made. No doubt those policy recommendations will be adopted once the boss is back from sick leave.”

“So they weren’t actual policy as yet?”

“No, not just yet. It was part of some recommendations he was working on. I think he’d suggested all contractors should pay for their car park spaces and lunches as well.”

“...and?”

“Well it was all perfectly reasonable. After all, they were struggling to be able to give IT middle management a Christmas bonus and needed to make some savings somewhere – which it looks like they’ve done.”

"So it wasn't started by something far less technical - your assistant for instance?"

"Surely not?" I ask, feigning a lack of knowledge - well, truth be told, I had noticed the pronounced curved scar in the plastic lid debris which can only have been made by a fire axe.  The same type of fire axe the company had removed from the building months ago.  The same type of fire axe that the PFY stole several of prior to the arrival of the removal agents.

"I'll think you'll find it was him!" the H&S geek cries.

SANS - Survey on application security programs

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.