Feeds

BOFH: The day the office budget bombed – literally

Explosive network kit Trojan

Combat fraud and increase customer satisfaction

Curtains for PFY or will someone rain on the geek's parade?

"So you're saying someone saw him do this?" I ask.

"No," the geek says, with a slight hesitation.

"So it could have been anybody?"

"It COULDN'T have been anybody - and you know how I know this?"

"I'm sure I don't," I reply.

"I KNOW because I had this forensically analysed," he blurts, pointing to a label on the ziplock bag.

"Sorry, you had a laptop analysed by a forensics expert?" I ask, imagining CSI  Luton and a new episode twist: one where they don't have to call in the kebab fat spatter analyst or rely on a shell-suit arse print to identify the culprit.

"Yes!" the H&S guy blurts triumphantly.

"For what?"

"I happened to notice the odour of ... urine."

"Oh, you mean when I tried to put the fire out after the extinguisher made things worse?"

"The same way you tried to put your boss out?" the H&S guy snaps, holding up another bag with the boss's scorched shirt in it.

"It was an act of mercy!"

"I think we all know what happened here - and as soon as your manager is ready to speak we'll get to the bottom of it. And rest assured that if there's even a HINT of suspicious activity in this I'll be referring this to the police!"

"As well you should," I say as he storms out of the office.

Two minutes later, the phone rings.

"Hello Systems."

"I know it's you, you know," the H&S geek says.

"Us what?" I ask.

"That's turned off my network so I can't send any email."

"No, no, that'll just be your access port flaking out. Tell you what, I'll send the PFY up with a new desktop switch for you - we'll get that lit up in no time." ®

Combat fraud and increase customer satisfaction

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
Microsoft builds teleporter weapon to send VMware into Azure
Updated Virtual Machine Converter now converts Linux VMs too
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.