BOFH: How dangerous are your users?

Click here to find out


BOFH Userometer - an online sysadmins resource

Sure, your users may look about as likely to rebel as the pack of mindless sheep that they are - but can they be trusted?

  • Are your users reading forbidden literature?
  • Are they trying to climb the technical greasy pole behind your back?
  • How will you know?
  • Can the cattle prod be trusted to solicit the truth?

It's time to put it to the test!

Put yourself in your users' place and answer these simple questions to see if things are going according to plan at YOUR workplace.

1. A MAC Address is:

A. A place you get Quarter Pounders
B. A street address in Scotland
C. Something Technical
D. A Hardware Address in Networking
E. Something technical a system administrator changes to cause the Boss's machine to lose network connection

2. You ring your Systems and Network people because the server has just gone down and you want to know when it will be up again. You expect them to tell you:

A. A number of minutes
B. A number of days
C. To sod off
D. The incriminating evidence they found in your email folder
E. The incriminating evidence they just placed in your email folder

3. The low-power components in your laptop are optimised to run at what voltage?

A. DC
B. AC
C. Whatever the adapter says
D. Just under 3 volts
E. 240 volts AC, and not a volt less!

4. You bring a box of 9 track tapes of your life's work to the operators to read in so that you can download them to your PC. The operator tells you it should be there in an hour. This means:

A. It will be loaded into your home share in an hour
B. It will be loaded into your home share today sometime
C. It will be loaded into your home share this week sometime
D. It will be loaded into your home share when hell freezes over
E. The Operator's bin has recently become full

5. You smell smoke in the building. You know immediately that:

A. You should sound the alarm
B. You should make your way quickly to the exit, notifying staff as you go
C. You should turn your machine off in case the sprinklers activate
D. The System Administrator is interviewing consultants again
E. The operator's bin doesn't need emptying any more

6. The faultiest piece of crap in the building is:

A. Sitting in the bin outside the head of IT's office
B. Sitting on the floor outside the head of IT's office
C. Sitting on the floor inside the head of IT's office
D. Sitting on the desk inside the head of IT's office
E. Sitting on the chair behind the Head of IT's desk, talking on the phone.

7. The best place to backup your files is:

A. To your Home Share, just like the System Admin said
B. To the TEMP directory, just like the System Admin said
C. To ZIP disk
D. (c) to Several Zip disks, and possibly CD-ROM
E. To the Recycle bin, to save the System Admin the trouble

8. The danger of leaving your machine switched on is:

A. It could catch fire
B. It could become a security risk
C. The disk could crash
D. It wastes lots of power
E. The processor might burn the System Administrators hand when he replaces it with a ... faster one ... late at night.

9. The security and integrity of your email is protected by:

A. Your password
B. Company Policy
C. PGP Encryption
D. Microsoft's pursuit of excellence. Waaaaaa ha ha ha!
E. Two pints for the System Administrator every Friday night

10. A System Administrator slaps a piece of paper down in front of you with lots of large technical words on it... which don't mean anything to you. He also indicates a line, with a large X beside it. You:

A. Sign on the line
B. Sign on the line
C. Sign on the line
D. Sign on the line
E. Refuse to sign on the line then check on your life Insurance Payments.

 


Other stories you might like

  • Tencent admits to poisoned QR code attack on QQ chat platform
    Could it be Beijing was right about games being bad for China?

    Chinese web giant Tencent has admitted to a significant account hijack attack on its QQ.com messaging and social media platform.

    In a post to rival social media platform Sina Weibo – a rough analog of Twitter – Tencent apologized for the incident.

    The problem manifested on Sunday night and saw an unnamed number of QQ users complain their credentials no longer allowed them access to their accounts. Tencent has characterized that issue as representing "stolen" accounts.

    Continue reading
  • Carnival Cruises torpedoed by US states, agrees to pay $6m after waves of cyberattacks
    Now those are some phishing boats

    Carnival Cruise Lines will cough up more than $6 million to end two separate lawsuits filed by 46 states in the US after sensitive, personal information on customers and employees was accessed in a string of cyberattacks.

    A couple of years ago, as the coronavirus pandemic was taking hold, the Miami-based biz revealed intruders had not only encrypted some of its data but also downloaded a collection of names and addresses; Social Security info, driver's license, and passport numbers; and health and payment information of thousands of people in almost every American state.

    It all started to go wrong more than a year prior, as the cruise line became aware of suspicious activity in May 2019. This apparently wasn't disclosed until 10 months later, in March 2020.

    Continue reading
  • India extends deadline for compliance with infosec logging rules by 90 days
    Helpfully announced extension on deadline day

    India's Ministry of Electronics and Information Technology (MeitY) and the local Computer Emergency Response Team (CERT-In) have extended the deadline for compliance with the Cyber Security Directions introduced on April 28, which were due to take effect yesterday.

    The Directions require verbose logging of users' activities on VPNs and clouds, reporting of infosec incidents within six hours of detection - even for trivial things like unusual port scanning - exclusive use of Indian network time protocol servers, and many other burdensome requirements. The Directions were purported to improve the security of local organisations, and to give CERT-In information it could use to assess threats to India. Yet the Directions allowed incident reports to be sent by fax – good ol' fax – to CERT-In, which offered no evidence it operates or would build infrastructure capable of ingesting or analyzing the millions of incident reports it would be sent by compliant organizations.

    The Directions were roundly criticized by tech lobby groups that pointed out requirements such as compelling clouds to store logs of customers' activities was futile, since clouds don't log what goes on inside resources rented by their customers. VPN providers quit India and moved their servers offshore, citing the impossibility of storing user logs when their entire business model rests on not logging user activities. VPN operators going offshore means India's government is therefore less able to influence such outfits.

    Continue reading
  • Hangouts hangs up: Google chat app shuts this year
    How many messaging services does this web giant need? It's gotta be over 9,000

    Google is winding down its messaging app Hangouts before it officially shuts in November, the web giant announced on Monday.

    Users of the mobile app will see a pop-up asking them to move their conversations onto Google Chat, which is yet another one of its online services. It can be accessed via Gmail as well as its own standalone application. Next month, conversations in the web version of Hangouts will be ported over to Chat in Gmail. 

    Continue reading

Biting the hand that feeds IT © 1998–2022