PFY vs Bearded 80s Netscape Bore: BOFH

I've written a plugin BLAH BLAH BLAH


Episode 5

bofh_toppy

You know what it's like. Some idiot in senior management buys a crap bit of software online - with functionality that's already built into Outlook, but is just slightly different - and it has to be installed right now.

And the moment you double-click on the installer you know you're in trouble when it tells you that it's confirming the version of Netscape Navigator you're running.

The installation fails of course, possibly because you don't know the correct advanced settings to use, but more likely because it wants you to 'upgrade' to the SE edition of Windows 98.

You ring the support line – which you suspect is a pay phone in a minicab office – and they say they'll have to send their expert out – an independent contractor who is the sole support person for this product in the entire UK. And probably drives a minicab part time, because business is so brisk ...

"He's going to have a beard," the PFY says, as we try and guess the expert they'll be sending over.

"Yes, a beard - but not a goatee," I concur. "That would be way too hip for this software. Almost '90s. No, I'm thinking full-on beard, sideburns and mo. And ... a cardigan."

"And those slacks that have a belt sewn into them with a crest or something on the buckle ..." the PFY adds.

"And ... tan shoes. Drives an immaculately cared-for Ford Granada - Daytona Yellow, if I'm not mistaken - with the protective plastic still on the back seats," I add.

"That's a little precise isn't it?" the PFY says.

"Not really. He's just pushed the call button on the car park intercom," I respond, tapping a picture on my monitor.

>Minutes later<

"Nice Granada!" the PFY says, almost blowing a circuit breaker on his sarcasm suppression circuits after Gregory introduces himself. GregORY - not Greg.

"Thanks. It's the classic Mark 2 model - the same model they used in The Sweeney. I've had it from new!"

"Of course you have."

"I've had tons of offers on it because of its pristine condition and low mileage," our expert burbles. "Blah blah blah blah blah ..."

Which is why you never engage 'experts' in non-technical conversations ...

"So what do you reckon is going wrong with the install?" I ask.

"It'll be a browser incompatibility thing," he responds. "But I've written a plugin for Firefox which replicates all the original functionality of the Netscape Browser. It was quite a job too, because blah blah blah blah blah blah blah blah ..."

Which is why you never engage 'experts' in technical conversations ...

"Blah blah blah blah blah blah interface," he finishes.

"Sounds very interesting," the PFY lies.

"Yes, it turns out that the original HTTP spec had options to blah blah blah blah ..."

Which is why you never say anything that intimates that you might be interested in what 'experts' have to say ...

"Blah," GregORY adds.

"Yes?" I say, eyes glazing over.

"I know it sounds like gobbledygook to you, but to technical people it's really quite ground-breaking," he sniffs.

"You know we're running hundreds of virtual servers, state-of-the-art distributed Net-RAID clusters, six different versions of Linux, three versions of Windows and have developed our own in-house security and tracking system?" the PFY asks.

"Uh-huh. So if you could just show me where the problem machine is," GregORY asks, unrolling one of those flexible rubber keyboards that look so cool in the movies but are such a pain in the arse in real life.

"There's already a keyboard on the machine," the PFY says.

"Ah yes, but this one has been ergonomically adjusted to my hand span," he says.

A quick glance at the keyboard concerned shows that it has indeed seen the business end of a heat gun and a stretching loom, or – taking GregORY into account one more time – a hairdryer and the back of an armchair.

While GregORY sets himself and his USB floppy drive up, the PFY foolishly engages him in some idle chit-chat.

"I'm more a Cortina man than the Granada. Lighter frame, which means you can overspec the suspension and shocks, fill the boot and doors with cement and have a vehicle that you never have to worry about in heavy traffic. Sure, you have to be careful going down hills because the brakes are a bit crap, but they're a great ride nonetheless!"

I leave as the various merits of the aged Ford stable are discussed at length, returning to find GregORY waxing lyrical about his browser modifications.

"So you just rename the browser image file & directory and get it to report that it's Netscape?" the PFY asks.

"Yes."

"That's it?"

"It's a little more complicated than it sounds," GregORY says, more than a little offended. "It's a lot trickier than changing tapes and looking at CCTV. You could train a monkey to do that."

The PFY stalks off - which is never a good sign.

"I think I offended him," GregORY murmurs with a tinge of remorse.

"Oh, I wouldn't worry about him, he tends to bounce back," I say. "So tell me about these browser mods?"

"Blah blah blah," he replies.

"Oh right, I see. That sounds very interesting," I mumble. "BUT WAIT, can you identify THIS mystery sound?"

I turn up the volume on my desktop as GregORY listens intently.

"I don't know," he admits. "It sounds a little like rubbish bins banging together."

"COLD."

"Rubbish bins being emptied? I can hear metal, and glass."

"STILL COLD."

"I give up."

"Well, I'm no 'expert', but doesn't it sound a bit like a cement filled Ford Cortina repeatedly backing into a Daytona Yellow Ford Granada?"

"Gosh," I add, flipping the basement car park monitor around. "You could teach a monkey to drive like that!" ®

Similar topics

Broader topics


Other stories you might like

  • AI tool finds hundreds of genes related to human motor neuron disease

    Breakthrough could lead to development of drugs to target illness

    A machine-learning algorithm has helped scientists find 690 human genes associated with a higher risk of developing motor neuron disease, according to research published in Cell this week.

    Neuronal cells in the central nervous system and brain break down and die in people with motor neuron disease, like amyotrophic lateral sclerosis (ALS) more commonly known as Lou Gehrig's disease, named after the baseball player who developed it. They lose control over their bodies, and as the disease progresses patients become completely paralyzed. There is currently no verified cure for ALS.

    Motor neuron disease typically affects people in old age and its causes are unknown. Johnathan Cooper-Knock, a clinical lecturer at the University of Sheffield in England and leader of Project MinE, an ambitious effort to perform whole genome sequencing of ALS, believes that understanding how genes affect cellular function could help scientists develop new drugs to treat the disease.

    Continue reading
  • Need to prioritize security bug patches? Don't forget to scan Twitter as well as use CVSS scores

    Exploit, vulnerability discussion online can offer useful signals

    Organizations looking to minimize exposure to exploitable software should scan Twitter for mentions of security bugs as well as use the Common Vulnerability Scoring System or CVSS, Kenna Security argues.

    Better still is prioritizing the repair of vulnerabilities for which exploit code is available, if that information is known.

    CVSS is a framework for rating the severity of software vulnerabilities (identified using CVE, or Common Vulnerability Enumeration, numbers), on a scale from 1 (least severe) to 10 (most severe). It's overseen by First.org, a US-based, non-profit computer security organization.

    Continue reading
  • Sniff those Ukrainian emails a little more carefully, advises Uncle Sam in wake of Belarusian digital vandalism

    NotPetya started over there, don't forget

    US companies should be on the lookout for security nasties from Ukrainian partners following the digital graffiti and malware attack launched against Ukraine by Belarus, the CISA has warned.

    In a statement issued on Tuesday, the Cybersecurity and Infrastructure Security Agency said it "strongly urges leaders and network defenders to be on alert for malicious cyber activity," having issued a checklist [PDF] of recommended actions to take.

    "If working with Ukrainian organizations, take extra care to monitor, inspect, and isolate traffic from those organizations; closely review access controls for that traffic," added CISA, which also advised reviewing backups and disaster recovery drills.

    Continue reading

Biting the hand that feeds IT © 1998–2022