• (cs) in reply to YourMoFoFriend
    YourMoFoFriend:
    freelancer:
    YourMoFoFriend:
    Why is everyone bashing the users for their "insecure" environments? After all, it's THEIR system, THEIR rules and THEY are stuck working with it every day. Our job is to build what they want to THEIR specifications, inform them of the risks and then STFU.
    And where do they complain when something goes wrong? When they loose their files? When they can't login, because their account is locked out? That's right, they complain to us. So no, it's not their system. It's our system, because we have to take the shit when it (read: they) fails.
    They complain to those who they pay for the support. And if it's you, then please take the money, do the work and STFU. Oh, yeah, didn't I say "INFORM THEM OF THE RISKS"? Right, I did. And if that's the risk they are willing to take... so be it, you just charge them more for your services since the risk is higher.
    Sadly it doesn't always work that way. Well, it may for IT consultants, but not actual employees. I for example can't just ask for more money. If I did, I'd be looking for a new job. Which means that if I just setup the system the way they want it, I'm gonna be doing a lot of extra work for no extra money. (For clarity: Where I work, I AM the IT department)
  • (cs)

    ok, I'm sure someone will miss the meaning behind my last comments, so I'll give examples, both of which actually happened.

    A guy shoots himself in the foot. Not ironic. The guy was a gun safety instructor giving a lesson at the time. That's irony.

    A government agency lays off a bunch of people due to lack of work. Not ironic. The agency was the unemployment office. That's irony.

  • Mike Nuss (unregistered)

    "The use of words expressing something other than their literal intention" - now THAT is irony.

    -- Bender

  • (cs) in reply to Mike Nuss
    Mike Nuss:
    "The use of words expressing something other than their literal intention" - now THAT is irony.

    -- Bender

    Not exactly, that could just be a double entendre, not irony. Remember irony is the perceived juxtaposition of the intended meaning and the actual meaning. So irony is always noticed by the observer.

  • Mischief (unregistered)

    http://www.m-w.com/dictionary/irony

    read it. then STFU about the definition of Irony.

  • (cs) in reply to gsmalleus
    gsmalleus:
    So I started setting up new accounts with the parameters that you must change your password upon first login. I also added password expirations, complexity rules, and not being able to repeat any of your past passwords.
    Mordac to Dilbert: "Squeal like a pig!"
  • (cs) in reply to AdT
    AdT:
    gsmalleus:
    So I started setting up new accounts with the parameters that you must change your password upon first login. I also added password expirations, complexity rules, and not being able to repeat any of your past passwords.

    Sorry, that's like fighting mosquitoes with nuclear bombs. The gnat's dead, but no one's there to enjoy it.

    My company may hold the record for most Gestapo-style password requirements (every 60 days):

    • can't repeat any of your last 32 passwords
    • min 8 characters, max 10
    • at least one letter, at least one number
    • no double letters (e.g. feet)
    • new password can't have same character in the same position as the previous password (if last password was "one", your new password can't have an O for a first character, or a N for a second.., and so on)

    The policy may say "for your security", but it guarantees post-it notes all around.

    Best security was my university - they ran your proposed password through at least one cracking program. If it was easily cracked (I don't know the criteria) it was rejected.

  • Devilfish (unregistered) in reply to freelancer
    YourMoFoFriend:
    freelancer:
    YourMoFoFriend:
    Why is everyone bashing the users for their "insecure" environments? After all, it's THEIR system, THEIR rules and THEY are stuck working with it every day. Our job is to build what they want to THEIR specifications, inform them of the risks and then STFU.
    And where do they complain when something goes wrong? When they loose their files? When they can't login, because their account is locked out? That's right, they complain to us. So no, it's not their system. It's our system, because we have to take the shit when it (read: they) fails.
    They complain to those who they pay for the support. And if it's you, then please take the money, do the work and STFU. Oh, yeah, didn't I say "INFORM THEM OF THE RISKS"? Right, I did. And if that's the risk they are willing to take... so be it, you just charge them more for your services since the risk is higher.

    And when they start badmouthing you for designing a lousy, insecure system, STFU too.

  • (cs) in reply to Jesse

    I remember that - then he says at least he can read the large print and his eyes fall out, then he's limited to the braille section but then his hands fall off.

    Or was that futurama?

  • (cs) in reply to Zxaos
    Zxaos:
    Why? Because they *obviously* need to track which actions were taken by which users. It's critically important that they know exactly what was done by whom.

    And the accountability is enforced how?.. If everyone has the same password you can just sign in as someone else if you're planning to do something bad purposely, or even when you're just starting the day with a bad hangover and know you're going to screw up.

  • (cs) in reply to AGould
    - min 8 characters, max 10 - at least one letter, at least one number - no double letters (e.g. feet) - new password can't have same character in the same position as the previous password

    Plus unless you're using extremely naive algorithms to measure entropy, those requirements all reduce the strength of the password.

    my passwords under that policy would be

    abcdefg1 bcdefgh2 cdefghi3 defghij4 and so forth in that manner. because then at least i wouldn't have to write it down.

  • Jeff (unregistered)

    Funny topic, as just a few weeks ago I wrote a blog post on how the lyrics to the song "Ironic" really isn't about irony. Yes, I know, it's shameless self-promotion, but here's the link:

    http://www.alphabetsoupfamily.com/blogs/archive/2007/05/22/24.aspx

    It's a coincidence that this post and my blog post are related in such a timely manner, but it's not ironic.

    Jeff

  • Jeff (unregistered)

    D'oh! If I'd previewed, I'd have realized it wasn't a link. So being the attention whore I am, I'm posting it again, actually as a link!

    Jeff

  • (cs) in reply to KattMan
    KattMan:
    ok, I'm sure someone will miss the meaning behind my last comments, so I'll give examples, both of which actually happened.
    I gotcher irony. Guy on a forum arguing with another guy: "You are so stupid! Can you spell looser?"
  • (cs) in reply to been there
    been there:
    -DNA scan to start each application (spousal and offspring authorization permitted with at least n matching genes)

    Spousal authorization would only work in some infamous parts of the world, I would think...

  • (cs) in reply to AGould
    AGould:
    - at least one letter, at least one number - no double letters (e.g. feet)

    Taking into account only these two requirements, roughly thirty percent [! - even I didn't expect it to be THAT high] of ten-character random alphanumeric passwords are rejected. That's a thirty percent reduction in the search space for any attacker. 33% of nine-character and a whopping 36 percent of eight-character passwords are rejected. Even more if the double letter requirement is case insensitive: 34, 37, and FORTY percent of 10, 9, and 8-character passwords are rejected. That's almost an entire bit of entropy lost (a random alphanumeric character provides just short of six bits)

    Addendum (2007-06-13 17:07): EDIT: Adding state to simulate the "no same character in same position as previous password" rule, the rejection percentages come out to about 48, 49 and 50%.

  • (cs) in reply to Random832
    Random832:
    AGould:
    - at least one letter, at least one number - no double letters (e.g. feet)

    Taking into account only these two requirements, roughly thirty percent [! - even I didn't expect it to be THAT high] of ten-character random alphanumeric passwords are rejected. That's a thirty percent reduction in the search space for any attacker. 33% of nine-character and a whopping 36 percent of eight-character passwords are rejected. Even more if the double letter requirement is case insensitive: 34, 37, and FORTY percent of 10, 9, and 8-character passwords are rejected. That's almost an entire bit of entropy lost (a random alphanumeric character provides just short of six bits)

    Addendum (2007-06-13 17:07): EDIT: Adding state to simulate the "no same character in same position as previous password" rule, the rejection percentages come out to about 48, 49 and 50%.

    But adding the state doesn't help the hacker as he would have to know the previous password in order to use it. As it does reduce things further over time, the overall pool of possible passwords remains the same.

  • (cs)

    Yeah, it's amazing people still stand by the "cycle your password every X days" crap.

    You know, most people remember even the most complex random-number/letter/capitals/punctuation password over time. Eventually, they'll have it memorized (normally takes anywhere from a week to a month). At which point, their passwords are very security complexity-wise, only that some idiot policy makes them change it shortly thereafter. Now they're stuck with a new password, which they have to write down because there's no way they can remember it! (And it lowers security, because if they know they can't remember it, they'll choose less secure passwords).

    Sometimes it's better to let a more secure password linger for years than to have people change it every couple of months (in which case they'll choose much less secure ones).

    Unfortunately, it's a positive feedback system. Users pick more easily memorable passwords because they're fed up memorizing/writing down their old ones, policy holders see post-its/less secure passwords and decrease the password lifetime...

  • dkf (unregistered) in reply to EvanED
    EvanED:
    We have physical locks on our building. Everyone has a copy of the same key.
    There's a keycode-d security door in our building that has the code written on the wall next to the door. On the side that the general public has access to, yes.
  • (cs) in reply to clevershark
    clevershark:
    Zxaos:
    Why? Because they *obviously* need to track which actions were taken by which users. It's critically important that they know exactly what was done by whom.

    And the accountability is enforced how?.. If everyone has the same password you can just sign in as someone else if you're planning to do something bad purposely, or even when you're just starting the day with a bad hangover and know you're going to screw up.

    A relative to irony is sarcasm. Learn to recognize it.

  • Jon (unregistered) in reply to Jesse
    Jesse:
    Interesting - I was just thinking about this song and how the situations she mentions really aren't ironic. A perfect example of ironic can be portrayed in a twilight zone episode, "Time enough at last" A man is constantly seeking time to have quiet to himself so he can read and eventually decides to lock himself in a vault. While in the vault, nuclear fallout takes place and he is safe inside the vault. After getting out and realizing what has happened, he is happy to know that there is "time enough at last" to do is reading. Then he breaks his glasses.
    Nope, that's not irony either. Check a dictionary -- it'll explain it better than I can.
  • YourMoFoFriend (unregistered) in reply to freelancer
    freelancer:
    Sadly it doesn't always work that way. Well, it may for IT consultants, but not actual employees. I for example can't just ask for more money. If I did, I'd be looking for a new job. Which means that if I just setup the system the way they want it, I'm gonna be doing a lot of extra work for no extra money. (For clarity: Where I work, I AM the IT department)
    I know exactly what you're saying and I agree with you, in fact I've been in that situation more than once. Yes, sometimes you have to think for them, but as a general rule I wouldn't implement a feature that is clearly an annoyance they'll "work around" anyway...
  • YourMoFoFriend (unregistered) in reply to Devilfish
    Devilfish:
    YourMoFoFriend:
    freelancer:
    YourMoFoFriend:
    Why is everyone bashing the users for their "insecure" environments? After all, it's THEIR system, THEIR rules and THEY are stuck working with it every day. Our job is to build what they want to THEIR specifications, inform them of the risks and then STFU.
    And where do they complain when something goes wrong? When they loose their files? When they can't login, because their account is locked out? That's right, they complain to us. So no, it's not their system. It's our system, because we have to take the shit when it (read: they) fails.
    They complain to those who they pay for the support. And if it's you, then please take the money, do the work and STFU. Oh, yeah, didn't I say "INFORM THEM OF THE RISKS"? Right, I did. And if that's the risk they are willing to take... so be it, you just charge them more for your services since the risk is higher.

    And when they start badmouthing you for designing a lousy, insecure system, STFU too.

    Actually no, that is the time you say the magic words "DESIGNED ACCORDING TO USER SPECIFICATIONS" :) Don't you think you have a better chance getting "badmouthed" if you give them a system with a bunch of stuff they don't want, don't need, don't like, didn't ask for and yet have to suffer with every day???

  • cognac (unregistered) in reply to Jeff
    Jeff:
    Funny topic, as just a few weeks ago I wrote a blog post on how the lyrics to the song "Ironic" really isn't about irony. Yes, I know, it's shameless self-promotion, but here's the link:

    http://www.alphabetsoupfamily.com/blogs/archive/2007/05/22/24.aspx

    It's a coincidence that this post and my blog post are related in such a timely manner, but it's not ironic.

    I think it ironic that noboy cares [about the song] except you and your wife.

  • bleh (unregistered) in reply to sol
    sol:
    Okay I can not help myself. WTF why have a login at all.
    Heh. I've seen a app where each user has their own login-password, but the program connects to a data to validate the login and read it's data as sa with no password.
  • Morty (unregistered) in reply to KattMan
    KattMan:
    Honestly, give me one reason why you would force a random password change?

    Once upon a time, this made a lot of sense. Passwords on some systems (i.e. old Unix systems) used to be stored using a relatively weak hashing algorithm in a world-readable file. So when you changed your password, you had a window of a few months during which your password could be presumed "safe", after which, you really should change it. Unix systems eventually went to shadowed password files, but Windows reintroduced the same issue with the Windows password hashing system in the LAN manager days.

    Today, this is less justifiable. But there is still some logic to it. If you have a means of login that does NOT lockout accounts with N failed logins, then it's possible for an ehaustive search attack to find your passwords, unless you periodically change your passwords. There is also always the chance that your passwords have been compromised via a one-time attack, which wasn't detected; periodically changing passwords limits the damage that the attacker can do.

  • mrV (unregistered)

    regarding the Alanis Morissette song Ironic -- is it not true that only one subject of what she was singing qualifies (possibly) as irony, while the rest is something else .. should be renamed to "!Ironic" or alike

  • jbinaz (unregistered) in reply to cognac
    cognac:
    Jeff:
    I think it ironic that noboy cares [about the song] except you and your wife.

    Well, I (and I don't think my wife does either) don't really care about the song, just Alannis Morissette's stupidity. Actually, I don't even care about her.

    But apparently myself and a lot of other people care about commenting about not caring. :p

  • (cs) in reply to JoC
    JoC:
    In my last job search I found myself explaining to a headhunter that I wanted something challenging. She informed me that the job I was being recruited for was maintaining a VB6 application with a codebase Microsoft had said was 'the biggest they have seen'.

    Not quite the challenge I was looking for....

    .... Shudder .....

  • (cs) in reply to freelancer
    freelancer:
    YourMoFoFriend:
    Why is everyone bashing the users for their "insecure" environments? After all, it's THEIR system, THEIR rules and THEY are stuck working with it every day. Our job is to build what they want to THEIR specifications, inform them of the risks and then STFU.
    And where do they complain when something goes wrong? When they loose their files? When they can't login, because their account is locked out? That's right, they complain to us. So no, it's not their system. It's our system, because we have to take the shit when it (read: they) fails.

    Yeah, and if we enforce security the lusers run to their PHB and lie that they cannot work because of the new password rules.

  • (cs) in reply to AGould
    AGould:
    AdT:
    gsmalleus:
    So I started setting up new accounts with the parameters that you must change your password upon first login. I also added password expirations, complexity rules, and not being able to repeat any of your past passwords.

    Sorry, that's like fighting mosquitoes with nuclear bombs. The gnat's dead, but no one's there to enjoy it.

    My company may hold the record for most Gestapo-style password requirements (every 60 days):

    • can't repeat any of your last 32 passwords
    • min 8 characters, max 10
    • at least one letter, at least one number
    • no double letters (e.g. feet)
    • new password can't have same character in the same position as the previous password (if last password was "one", your new password can't have an O for a first character, or a N for a second.., and so on)

    The policy may say "for your security", but it guarantees post-it notes all around.

    <SNIP>

    If they are that serious about security then they would accompany the above mentioned password measures with physical workplace security reviews held well after working hours: check every workplace by experienced security personnel (or a PI specialized in things like that) and somebody from HR called in just before the review, document every security violation (photo) and then fire a few violators "pour encourager les autres".

  • (cs) in reply to YourMoFoFriend
    YourMoFoFriend:
    Devilfish:
    YourMoFoFriend:
    freelancer:
    YourMoFoFriend:
    Why is everyone bashing the users for their "insecure" environments? After all, it's THEIR system, THEIR rules and THEY are stuck working with it every day. Our job is to build what they want to THEIR specifications, inform them of the risks and then STFU.
    And where do they complain when something goes wrong? When they loose their files? When they can't login, because their account is locked out? That's right, they complain to us. So no, it's not their system. It's our system, because we have to take the shit when it (read: they) fails.
    They complain to those who they pay for the support. And if it's you, then please take the money, do the work and STFU. Oh, yeah, didn't I say "INFORM THEM OF THE RISKS"? Right, I did. And if that's the risk they are willing to take... so be it, you just charge them more for your services since the risk is higher.

    And when they start badmouthing you for designing a lousy, insecure system, STFU too.

    Actually no, that is the time you say the magic words "DESIGNED ACCORDING TO USER SPECIFICATIONS" :) Don't you think you have a better chance getting "badmouthed" if you give them a system with a bunch of stuff they don't want, don't need, don't like, didn't ask for and yet have to suffer with every day???

    That only works if you have the specs in writing. Do you really think that users like that would write everything down - no way. A dorky "requirement" (and I am using the phrase in the widest possible context) would almost naturally be verbal. And then you have to decide what to do: (a) refuse to do it until they give to you in writing. If you are an employee then can just order you to implement it eventually (user PHB runs to IT PHB and complains, IT PHB gives a direct order - works every time). (b) do it, and report in writing to your IT PHB and get the PHB to sign along with date received a written copy of the report. Then it is the PHB's problem and you have your own CYOA document (keep it at home in pastic becuase of the PHB's fingerprints and a scan of it in your computer files) so that when they raid your desk/cubicle to get at it they don't have a chance).

  • DOA (unregistered) in reply to YourMoFoFriend
    YourMoFoFriend:
    Why is everyone bashing the users for their "insecure" environments? After all, it's THEIR system, THEIR rules and THEY are stuck working with it every day. Our job is to build what they want to THEIR specifications, inform them of the risks and then STFU.
    Fine by me. Just make sure you get paid when you come in to clean up the mess. Otherwise (if you're providing support for a set monthly fee for example) you'll be working your ass off to fix the idiots' mess.
  • DOA (unregistered) in reply to Worf
    Worf:
    Yeah, it's amazing people still stand by the "cycle your password every X days" crap.

    You know, most people remember even the most complex random-number/letter/capitals/punctuation password over time. Eventually, they'll have it memorized (normally takes anywhere from a week to a month). At which point, their passwords are very security complexity-wise, only that some idiot policy makes them change it shortly thereafter. Now they're stuck with a new password, which they have to write down because there's no way they can remember it! (And it lowers security, because if they know they can't remember it, they'll choose less secure passwords).

    Sometimes it's better to let a more secure password linger for years than to have people change it every couple of months (in which case they'll choose much less secure ones).

    Unfortunately, it's a positive feedback system. Users pick more easily memorable passwords because they're fed up memorizing/writing down their old ones, policy holders see post-its/less secure passwords and decrease the password lifetime...

    Agreed. I find that password policy makers and users need to meet half-way. I don't expect a small company user to have a overly complicated, constantly changing password in a non-essential local app, but it grates on my nerve when I see them use 12345. My usual suggestion is to use the first letter of each word in a random phrase (ie to be or not to be, etc) which is both memorable and makes a semi-decent password. Most times though I get blank stares and requests for a 3-letter password, which needless to say is used by the whole office.

  • (cs) in reply to Sgt. Preston

    I'm not sure that Ms Morissette had much in mind at all. However, wouldn't it be more ironic (given the superstition) if it didn't rain on your wedding day - the agony of seeing such a beautiful day and knowing it was unlucky? Or perhaps the true irony lies in the fact that her song contained nothing ironic, yet was called 'Ironic'? Maybe that was her intent? = Recursion!!

  • (cs)

    This is like IIS (MicroSoft Internet Information Server)... if you disable anonymous FTP (which is enabled by default) you're prompted with the warning that sending passwords across the internet isn't secure and that you'd better leave anonymous FTP on unless you really don't want it...

    Coditor

  • Lemb (unregistered) in reply to KattMan

    Honestly, give me one reason why you would force a random password change?

    The only case that makes sense is that passwords tend to be diffused/spread to other people. Which is bad: how many people would change their password by themselves, even after they gave it to anybody? Still, this is completedly overshadowed by the classical post-it consequence of mandatory changes.

    You might also have the dreaded expired account (the person has left) but the account has not been removed (which is stupid of course).

  • Robin Lionheart (unregistered)

    http://www.collegehumor.com/article:1711139

    I decided to forgive Alanis for "Ironic" the day I saw the video of her cover of "My Humps".

  • iogy (unregistered) in reply to AGould
    AGould:
    My company may hold the record for most Gestapo-style password requirements (every 60 days):
    - Every 60 days, regardless if it's compromised or not? Yeah, like passwords that haven't been discovered yet decay in one way or another. Stupid.
    • Max 10 characters? What? If anything, that makes it more predictable, because you know the calculation time. I guess this was a compromise because Doris at marketing couldn't remember hers for 4 times in a row.

    • No double letters? Yeah, because whatever's in good password can be used as a hint to look for the next letter. Brute force doesn't work that way.

    • No repeating? Combine this with the 60 days policy and you'll get incremental passwords like lion1234, puma2345 etc.

    The policy may say "for your security", but it guarantees post-it notes all around.
    The policy was drafted by a clueless PHB who probably asked IT to spare him so he could keep his own "12345".

    Actually, Post-It notes are the best way to push the idiots in charge of this to a better solution. Just invite one to come with you and make a roundtrip at the keyboards - if you can show you can compromise 80% of the workforce's system thanks to their stupid measures, I think you may have a point. Don't do this by yourself - such a security "audit" means getting fired.

    Good luck.

  • cy (unregistered) in reply to KattMan
    KattMan:

    Honestly, give me one reason why you would force a random password change?

    In case of breech? Well, if it isn't breeched why change it? If you ever find a breech? Then you change it right away, not wait for the schedule.

    Why would you want to change a password when you find one of a pair of knee-length trousers? Oh, I see, it is if you find some buttocks --- or a baby about to be born the wrong way round. Then of course you do...

  • Sgt. Preston (unregistered) in reply to Unklegwar
    Unklegwar:
    The REAL Wtf is that no one seems to know WTF Irony is. And some even write songs about it.

    Jake, your example about the re-assuring comment, NOT irony. A mistake != irony. Misjudging appropriateness != Irony.

    I think that Jake's example was spot on: "making an offhanded remark to reassure you, but rather making you feel worse." This fits one of the most common definitions of irony: "an outcome of events contrary to what was, or might have been, expected."
  • (cs) in reply to cklam
    cklam:
    freelancer:
    YourMoFoFriend:
    Why is everyone bashing the users for their "insecure" environments? After all, it's THEIR system, THEIR rules and THEY are stuck working with it every day. Our job is to build what they want to THEIR specifications, inform them of the risks and then STFU.
    And where do they complain when something goes wrong? When they loose their files? When they can't login, because their account is locked out? That's right, they complain to us. So no, it's not their system. It's our system, because we have to take the shit when it (read: they) fails.

    Yeah, and if we enforce security the lusers run to their PHB and lie that they cannot work because of the new password rules.

    Which means that, basically, we're screwed either way. In which case we might as well design the system as we see fit.

  • ForcedSterilizationsForAll (unregistered) in reply to Frostcat
    Frostcat:
    da1l6:
    This is really worse than failure.

    Sadly I experienced something similar at a small institution where all newly created user accounts were set up with username==password. Most users refuse to change the password.

    Argument: "What if user X gets ill and we need one of his files?"

    Last place I worked, the custom app we used, and that I worked on, had an option, just like Windows accounts, to force you to change your password on next login. So when we'd get change reqs, we'd set the password to the userid, and check the box. No problem. The argument about user X's files was irrelevant, because anything that would've been stored as a file outside the app would be accessible via NTFS perms.

    Or you could always just set up a temporary path to the user's machine and get the files that way.

  • ForcedSterilizationsForAll (unregistered) in reply to Random832
    Random832:
    I remember that - then he says at least he can read the large print and his eyes fall out, then he's limited to the braille section but then his hands fall off.

    Or was that futurama?

    What you saw was the parody of the actual episode. In the Twilight Zone episode his glasses break and that's the end. Your version was most likely from either the Simpsons or Futurama.

  • ForcedSterilizationsForAll (unregistered) in reply to clevershark
    clevershark:
    been there:
    -DNA scan to start each application (spousal and offspring authorization permitted with at least n matching genes)

    Spousal authorization would only work in some infamous parts of the world, I would think...

    Yeah, predominantly in the bible belt of the US. ;)

  • (cs) in reply to cklam
    cklam:
    If they are that serious about security then they would accompany the above mentioned password measures with physical workplace security reviews held well after working hours: check every workplace by experienced security personnel (or a PI specialized in things like that) and somebody from HR called in just before the review, document every security violation (photo) and then fire a few violators "pour encourager les autres".

    If they're serious about security at all, they'll hire someone to tell them they shouldn't be cutting the number of possible passwords in half.

  • ForcedSterilizationsForAll (unregistered) in reply to cklam
    cklam:
    YourMoFoFriend:
    Devilfish:
    YourMoFoFriend:
    freelancer:
    YourMoFoFriend:
    Why is everyone bashing the users for their "insecure" environments? After all, it's THEIR system, THEIR rules and THEY are stuck working with it every day. Our job is to build what they want to THEIR specifications, inform them of the risks and then STFU.
    And where do they complain when something goes wrong? When they loose their files? When they can't login, because their account is locked out? That's right, they complain to us. So no, it's not their system. It's our system, because we have to take the shit when it (read: they) fails.
    They complain to those who they pay for the support. And if it's you, then please take the money, do the work and STFU. Oh, yeah, didn't I say "INFORM THEM OF THE RISKS"? Right, I did. And if that's the risk they are willing to take... so be it, you just charge them more for your services since the risk is higher.

    And when they start badmouthing you for designing a lousy, insecure system, STFU too.

    Actually no, that is the time you say the magic words "DESIGNED ACCORDING TO USER SPECIFICATIONS" :) Don't you think you have a better chance getting "badmouthed" if you give them a system with a bunch of stuff they don't want, don't need, don't like, didn't ask for and yet have to suffer with every day???

    That only works if you have the specs in writing. Do you really think that users like that would write everything down - no way. A dorky "requirement" (and I am using the phrase in the widest possible context) would almost naturally be verbal. And then you have to decide what to do: (a) refuse to do it until they give to you in writing. If you are an employee then can just order you to implement it eventually (user PHB runs to IT PHB and complains, IT PHB gives a direct order - works every time). (b) do it, and report in writing to your IT PHB and get the PHB to sign along with date received a written copy of the report. Then it is the PHB's problem and you have your own CYOA document (keep it at home in pastic becuase of the PHB's fingerprints and a scan of it in your computer files) so that when they raid your desk/cubicle to get at it they don't have a chance).

    you know, you can simply say "hey, can you email that request to me because I'll never remember it." I used to do that where I worked before as a C.Y.A.

    Now, thankfully, we have a work request system where any changes have to be submitted to that and approved by the requestor's supervisor. It then gets estimated and goes through a further approval process. Any changes that are more urgent (such as data fixes) are done and then the request is submitted.

    I like this system much better.

  • (cs) in reply to AGould
    AGould:
    My company may hold the record for most Gestapo-style password requirements (every 60 days): - can't repeat any of your last 32 passwords - min 8 characters, max 10 - at least one letter, at least one number - no double letters (e.g. feet) - new password can't have same character in the same position as the previous password (if last password was "one", your new password can't have an O for a first character, or a N for a second.., and so on)
    Wow. Normally I'd be concerned about password cracking because of the forced limits on entropy (between 8 and 10 characters, no repeating letters), but that last requirement means the passwords are stored in plaintext. Beautiful.
  • Nelle (unregistered) in reply to Poltras
    Poltras:
    Talking about security, you don't need a captcha to register an account.

    See, that's irony too.

    good one :)

  • John Doe (unregistered) in reply to da1l6

    Or like my new job.

    1. Password == first five chars username
    2. Users are unable to change password
    3. Admin stores username and password in an excel sheet

Leave a comment on “It's Like Raiiiiiin”

Log In or post as a guest

Replying to comment #:

« Return to Article