Feeds

Five go wild with the Administration Tools Pack

Nobody owns the Linuxes, Julian

Top three mobile application threats

Stob As you have surely heard, it’s Alan Turing’s centenary this year, and the Bletchley Park museum is celebrating by releasing a game of Monopoly themed on the life of that mathematical genius. I’ll pause for a sentence or two here, while you let your boggle levels equalise, because, given Turing’s life story, this is a quite a bizarre concept to digest. For example, what are the Chance cards going to be like?

You are convicted of gross indecency. Go directly to Jail. Do not pass "Go". Do not collect £200.

Alternatively undergo a course of oestrogen injections to reduce your libido.

Anyway, this occurrence, combined with the grisly task of installing a new Windows server at work, and the experience of playing, as a favour to a friend, the formidably dull game IT Manager Duels (an Intel promo – you win by buying more machines... duh), have convinced me that it is time to go public with my own board game.

Fantasy Local Area Network borrows from the classic Monopoly – although in a way that is ingenious and fun and will, we hope, keep the Parker Bros' IP lawyers scratching their heads for the foreseeable.

Instead of the sooooh 20th Century scramble for property, the players acquire Local Area Networks to manage as they move around the board. These are then populated with little green pieces of plastic (representing workstations and laptops) and large red pieces of plastic (representing servers). The playing cards are (of course) in four suits: ISA, VESA, PCI and PCI+. You need to throw a throw a six to boot up - optionally making the appropriate whooshing noise - and then when you pass Go, you...

But wait. Rather than tediously walk you through all the rules, let us sit in, as it were, on a game in progress. Things will become perfectly clear.

Anne: My go. Shake, shake, shaky, shake... and throw!

Dick: That was in my glass!

Anne: Sorry. More ginger plop than ginger pop. I suppose it’s floating side up that counts. Got a four. Let’s see. One, two, three, four, and I’ve landed on Red Hat Square. Who owns Red Hat?

Julian: Haha! I own the Linuxes.

George (smugly): Nobody owns the Linuxes, Julian. They belong to the People, like the NHS, the late Princess Diana and Mo Farah.

Julian (warmly): They do not.

Anne: Oh, don’t let’s quarrel! Anyway, I suppose I must pay a forfeit. What is my forfeit, Julian?

Julian: You must spin the Wheel of Google.

Anne: Spin, Spinaway; Generous or Frugal;
I always feel lucky when I’m using Google.

Dick: Must you really do that every time?

George: What have you got, Anne?

Anne: It says: ‘Your virus-checker downloads an update that causes it to go insane and detect itself as malware. It tries to delete itself on every workstation on site. Helpdesk goes into meltdown. Spend three days trying to clear things up.’

Julian: I must say, that doesn’t sound very likely.

Dick: My go. Before I start, I’d like to promote my workgroup to a domain. Here, I’ll put the money for Windows Server licence in the bank. There. So, I’ll just throw the die... Four. Oooh, look, free mail server. Yipee! Goodbye to free Yahoo semi-numerical email addresses for my company!

Julian: So where are you going to install your mail server?

Dick: You what?

Julian: You’re not going to install it on your domain controller, are you? That’s bad practice, that is.

Dick: No, I was... Oh, all right. I won’t do that. Instead, I’ll just...

Julian: So where are you going to put your forest roles?

George: Oh Dick! Surely you aren’t going to have your Domain Master and your RID master on the same machine?

Dick (desperately thumbing through his cards): Um. Actually, I picked up this virtual machine card, so I thought I’d...

Julian (shocked into using his brother's Sunday name): Richard! You really aren’t going to perform a Physical to Virtual migration of your PDC, are you? Or... or install VMware?

George (her most sanctimonious voice): Everybody knows a domain controller isn’t for using. It is a holy thing: the most expensive kit in the building. It exists only to be worshipped and backed up, unencumbered by the commonplace vulgarities of ordinary life such as application software.

Julian: Dick’ll be wanting to use his PDC as a file server next.

Anne: Don’t tease him, Ju, he’s had a setback. Dick, you are a silly chump! You must miss a turn to re-plan your strategy. Whose go? Yes, go on George, and hurry up before I have to go and cook supper. By the way, what do you want for supper, Timmy?

Timothy: Sausages.

George (laughing): Good old Tim! You are incorrigible, whatever that means. All right. Gimme the shaker. And... four! Dib dib dib dob. Now, let’s see. ‘A mismatched calendar smartphone clent causes an event reminder to be duplicated 5,178,422 times. Spend two days googling for ineffectual solutions, occasionally pecking gently at the registry.’ Blast!

Julian: I told you your mobile phone policy was too slack. The way you’re going, you’ll never extend your network beyond 200 seats.

(A buzzer sounds.)

Dick: Time’s up! Change passwords, everybody.

George: What, again?

Julian: It’s one of the underlying planks of good security, George. You know that.

Anne: Don’t let’s make a fuss, George. I’m going to change mine to ‘strawberry’, because it’s my favourite fruit.

Julian: Anne, even for a girl, you really are a numskull.

Dick: Don’t be mean, Ju. It’s hardly Anne’s fault she is a girl. Anyway, it’s Timmy’s go.

George: Shall I shake for you, Tim? There we go. Four. Eeny, Meeny, Miny, Mo. ‘Risk or Reboot!’ What do you want to do? If I know you, you’ll want to take the risk.

Timothy: Yip.

George: Ok. The card says, ‘You have merged with another company. Drop everything, and spend three turns going through the hell that is the domain renaming process.’

Julian: Tricky one, that. Bad luck, Timmy. You will probably want to practise on a sandboxed test network a couple of times before you do it on the real thing.

Timothy: Grrr.

Julian: My turn. Actually, I’m not throwing the die this turn. In fact, I never believe in throwing the die. Instead, I am taking time to perform a practice restore on all my backups, so that I won’t be caught out in the event of a disaster. Any time I have left over, I will spend in web support fora, mocking those who have been less diligent than I, and now find themselves badly inconvenienced by the stern and immutable finger of fate.

George: Cousin Julian, can I just say something?

Julian: Yes?

George: You really are an unspeakable prig.

This charming scene, mixing the pleasures of family life with NetBIOS over TCP/IP, is just the sort of thing YOU could be doing on Christmas day, in between bringing the pudding/brandy fire under control and the argument over the newspaper quiz.

Send off 400 medium sized ones today to Stobbo Enterprises for your copy. Postal orders welcomed, Paypal not. Thanks for listening. ®

/strong

Top three mobile application threats

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.