• (cs) in reply to pjabbott

    pjabbott:
    Anonymous:
    The LAN probably wasn't TCP/IP based; Running off on DOS it may have been IPX, NetBUEI, or Appletalk (ok, probably not Appletalk)


    That's the part I don't get...it's very likely that at least one of these was used since it was DOS-based, but  none of those (IIRC) are routable so they would not work over the internet.

    This smells old Netware a lot. It was possible to encapsulate TCP/IP under IPX/SPX thru some NLM (Netware Loadable Modules) on the server. The LAN could work on IPX/SPX protocol but the PING command just work on TCP/IP (there is a different command for testing IPX replies) so the ping just works when internet link is up.

    In this case the TCP/IP layer just works with the link up.

    But the IPX layer works anyways, if not, may be the corrupted autoexec wasnt loading the NLMs correctly on the server OR all the IPX/SPX traffic on the clients was really encapsulated TCP/IP.

    Ok, sorry, it was suppoused to be funny, thats what Netware Engeneering Certification does with our minds after 16 years.

  • dnm (unregistered) in reply to RiX0R

    -1, Overrated.

    There was in fact, TCP/IP software for DOS, and it worked.

  • Brian (unregistered) in reply to Unklegwar

    Anonymous:
    I think this is the same network topography that my friends and I set up on our Windows 3.11 (wfw!) and DOS 5.1 machines with BNC connectors and COAX cables to play DOOM Deathmatch when it came out. 3 hours of putzing around, making sure everything was terminated, and installing IPX/SPX so we could run around for 30 minutes and get nauseous.

    No, actually, our network was much better.

    Good god.

    Ah, the good old days!  I remember doing the exact same thing.  God that was fun.

  • Foo Bar (unregistered) in reply to TheDoom
    Anonymous:
    Yanks eh? I thought they invented the electro-grid?
    I thought they invented PING....bugger me....
  • (cs) in reply to John Bigboote
    John Bigboote:
    ParkinT:

    So, the only way for me to get from my living room to my kitchen is to:

      Go out the unlocked front door,

      Drive out of my neighborhood into the adjoining big city,

      Drive back to my neighborhood (probably on different roads, but maybe not),

      Walk in through my unlocked front door,

      And into the kitchen (meeting a huge crowd of people)?



    "Have unprotected sex with a prostitute" should be in the middle there somewhere.

    Thank you.  I will. <g>

  • (cs) in reply to impslayer
    impslayer:

    Anonymous:
    I know a location where "windows network connection" is banned so printers cant be shared.

    The standar way to get something printed is:

    1) Use the "print as pdf" option
    2) Upload the file to a public website incomming folder
        (trough FTP or a upload.asp file )
    3) walk to the computer with printer
    4) Open a web browser
    5) Open the incomming folder, and open your document pdf file
    6) Print

    Often users make mistakes, so this cycle is repeated 3 o 4

    This is not as good has teh Linux Torbalds method to backup his kernel source :(  (let others mirror it).

    --Tei



    At least the printer is standing on a wooden table, right?

    But the table is grounded!!

  • Dale Williams (unregistered) in reply to RiX0R

    If they were REALLY lucky they might be using LANtastic!

  • Kazan (unregistered) in reply to ammoQ
    ammoQ:
    I can't decide what is worse: The production file server that boots from a floppy disk or the communication over the internet. The later is more dangerous, but the former seems more stupid.


    all our production server cluster (directors, app nodes, storage, database) boot up from something similiar to a livecd (i'm not sure what to call it, i didn't set it up) so that in the case of it being r00ted by a h4x0r we just reboot the machine and it's clean.  so maybe the floppy was write-protected? hehehe  


    captcha: enterprisey
  • Kurtz (unregistered) in reply to John

    My vote is for NetBUEI.

    "You have a right to do that... but you have no right to judge me. It's impossible for words to describe what is necessary to those who do not know what horror means. Horror. Horror has a face... and you must make a friend of horror. Horror and moral terror are your friends. If they are not then they are enemies to be feared. They are truly enemies. I remember when I was with Special Forces. Seems a thousand centuries ago..."

  • (cs) in reply to DZ-Jay

    I noticed that nobody commented on this...

    If the manager trusted this guy for 10 years, then it doesn't matter how right the new guy was when he tried to correct the problem. From the manager's perspective, the old guy had it running (presumably reasonably smoothly) for 10 years. Then the new guy comes in and all of sudden there are problems.

    I have a client whose business is completely dependent upon computers, but who is so computer illiterate it's scary. This person is on the trailing edge of the technology curve (mostly because the commercial software they use is supplied by vendors who are always waaaay behind the curve), and doesn't want to know any more than he has to. Granted, that's a wtf in itself, but a lot of small business owners I run into just want to concentrate on trying to run their businesses (most of which have nothing to do with, but run on, computers), they don't want to have to understand the technology that makes the computers work and talk to each other.

    Example: one of my mom-and-pop clients, going back to the days of DOS, had one computer for word processing, and another for spreadsheet work. Each computer was configured to launch the appropriate program with the appropriate document via autoexec.bat. No amount of explanation could convince them that they could run two different programs from the same computer. Even though the machines have long been upgraded and fitted with XP-Pro, they STILL have each machine launching ONE program (startup-group). They even tell me that they don't want to save the money on the second box because the person doing the keyboard entry just doesn't want to understand anything more. *sighs*

     

  • (cs) in reply to Real WTF Detector
    Real WTF Detector:
    The real, real WTF is having to tell the stupid story twice. Once for make believe in way that has nothing to do with what actually happened, and once possibly for real...

    ... or are you going to surprise us with the real, real, real WTF in a day or two?


    +1 Insightful!  (darn Slashdot ratings)

    I'm all for anonymizing stories to protect the guilty, but what good is it when the result is entirely a work of fiction?  If I wanted fictional WTFs I could make them up myself.  I thought I was coming here for true stories of real-world WTFery, but it's getting harder and harder to figure out what those are under the layers of anonymization.

    I have a suggestion, Alex: change the names, change the dates, even change the operating system if you really really have to, but don't go adding boot floppies into a nonexistent process if they weren't there in the original story.  All that does is make people go "Yes, but WTF *really* happened?"  And that's not the WTF we're looking for (speaking for at least me and "Real WTF Detector", that is).

  • David (unregistered) in reply to Karl von L.

    Anonymous:
    Someone approached Al Gore with this idea called "ping", so Gore invented the internet to make it a reality.

    You are the wind beneath my wings.

  • schwomp (unregistered) in reply to Poor sod
    Anonymous:
    notromda:

    "Could you explain what the problem was? was it firewalled, or misrouted?"

    The server was actually a Win2k3 Small Business Server machine...



    Are you absolute certain that the original post was the one you submitted?
    The similarities aren't that obvious..

  • (cs) in reply to stevekj
    stevekj:
    Real WTF Detector:
    The real, real WTF is having to tell the stupid story twice. Once for make believe in way that has nothing to do with what actually happened, and once possibly for real...

    ... or are you going to surprise us with the real, real, real WTF in a day or two?


    +1 Insightful!  (darn Slashdot ratings)

    I'm all for anonymizing stories to protect the guilty, but what good is it when the result is entirely a work of fiction?  If I wanted fictional WTFs I could make them up myself.  I thought I was coming here for true stories of real-world WTFery, but it's getting harder and harder to figure out what those are under the layers of anonymization.

    I have a suggestion, Alex: change the names, change the dates, even change the operating system if you really really have to, but don't go adding boot floppies into a nonexistent process if they weren't there in the original story.  All that does is make people go "Yes, but WTF *really* happened?"  And that's not the WTF we're looking for (speaking for at least me and "Real WTF Detector", that is).


    Hear, hear!
  • lrb (unregistered) in reply to schwomp

    Anonymous:
    Anonymous:
    notromda: "Could you explain what the problem was? was it firewalled, or misrouted?"

    The server was actually a Win2k3 Small Business Server machine...


    Are you absolute certain that the original post was the one you submitted?
    The similarities aren't that obvious..

     

    Maybe this was from another or Ishmael's part time's jobs.

  • Poor sod (unregistered) in reply to snoofle

    Snoofle said: "If the manager trusted this guy for 10 years, then it doesn't matter how right the new guy was when he tried to correct the problem. From the manager's perspective, the old guy had it running (presumably reasonably smoothly) for 10 years. Then the new guy comes in and all of sudden there are problems."

    ... and he is so, so right. Once he gave me that answer, I knew I was in trouble. That answer is so wrong that I could think of only four explanations for it:

    1. He misunderstood the question. (I asked again a different way and got the same answer)
    2. He was intoxicated
    3. He was intentionaly trying to sandbag me
    4. He was incompetent and had successfully hidden it from several employers

    After doing what I could to rule out the first explanation, I was left with a lot options that predicted a bad end to this gig. Once I figured out what was actually wrong, I strongly suspected that the customer's perception would cost me the contract so I gave them demostrations of the problems I saw and detailed after-action reports.

    It was not enough to overcome the perception you cite, and they ditched me.
  • Poor sod (unregistered) in reply to schwomp

    Schwomp: "Are you absolute certain that the original post was the one you submitted?"

    Yeah, Alex e-mailed me that morning.  It was changed more than I would have liked, and I didn't get to preview the story, but it's undoubtedly the same one. The point of the story, that "ping doesn't work on a local network" is unchanged. The other details were superfluous anyway, except as background for the punchline. (The changes did kind of mess up the whole CSI second-guessing thing for readers, though.)

    As a submitter I'm not inclined to complain... he didn't have to post it at all.


  • lrb (unregistered) in reply to Poor sod

    Anonymous:
    Snoofle said: "If the manager trusted this guy for 10 years, then it doesn't matter how right the new guy was when he tried to correct the problem. From the manager's perspective, the old guy had it running (presumably reasonably smoothly) for 10 years. Then the new guy comes in and all of sudden there are problems."

    ... and he is so, so right. Once he gave me that answer, I knew I was in trouble. That answer is so wrong that I could think of only four explanations for it:
    1) He misunderstood the question. (I asked again a different way and got the same answer)
    2) He was intoxicated
    3) He was intentionaly trying to sandbag me
    4) He was incompetent and had successfully hidden it from several employers

    After doing what I could to rule out the first explanation, I was left with a lot options that predicted a bad end to this gig. Once I figured out what was actually wrong, I strongly suspected that the customer's perception would cost me the contract so I gave them demostrations of the problems I saw and detailed after-action reports.

    It was not enough to overcome the perception you cite, and they ditched me.

    It's probably a good thing that they ditched you.  If you kept the contract, they would have probably still kept talking to Ishmael and you would have to do 10 times the work that needed to be done just to convince them that Ishmael's screwed up recommendations were full of that word that rhymes with bit.

  • (cs) in reply to stevekj

    stevekj:
    I'm all for anonymizing stories to protect the guilty, but what good is it when the result is entirely a work of fiction?  If I wanted fictional WTFs I could make them up myself.  I thought I was coming here for true stories of real-world WTFery, but it's getting harder and harder to figure out what those are under the layers of anonymization.

    I've received a couple emails about this, so I figured I'll reply here as well.

    Way back when, I would take submissions, clean up the code a bit, add a sentence or two, and post 'em. For example:

    Obviously, those posts are a lot different (and, IMO, not nearly as good) as today's. Without a back-story, we'd be left with language-specific "look at this bad code" posts -- something that a good portion of the technologically-diverse (both platform and skill level) audience would feel ostracized with. Think about The Magical Mystery Report (http://thedailywtf.com/forums/thread/78463.aspx): how many readers do you think would have "gotten" how bad it is to add nested cursors inside of a table-value function within a view?

    It would be nice if every submission came with a complete and certified "OK to post" back-story (like More Rube Goldberg, http://thedailywtf.com/forums/thread/73438.aspx), but they don't, nor do I expect them to given the small chance (10-15 submissions a day) of making it on the front page. So, this leaves me to fill in the back story with (what I believe to be) superfluous details that I've gleaned from other submissions and my personal experience.

    Does that make it like a "based on a true story" movie? I'll let you be the judge of that. You can be rest assured that I don't alter the "core WTF" -- all I add is some back story to aide in its entertainment and understanding.

    Oh, and as far as the added "Floppy in a Server" detail, it's an anecdote from a colleague of mine. He worked at a hospital when the NetWare (I believe) server died, causing a full outage of all workstations and servers. The exec script lived on a handful of bad sectors (on a boot floppy disk) and had to be rewritten from (ages old) printouts. This was, believe it or not, not even a drop in the "WTF bucket" as far as their infrastructure and how often it went down. Had I the time and resources to interview Alan (the submitter), I'm sure we would have had no trouble finding an equally offensive detail in a network engineered by Mr "Can't Ping On a Local Network."

  • barfo rama (unregistered)

    The internet mermaid wears an Al G. Bra.

    Captcha:  jiggles

  • barfo rama (unregistered) in reply to xrT
    xrT:
    John Bigboote:
    ParkinT:

    So, the only way for me to get from my living room to my kitchen is to:

      Go out the unlocked front door,

      Drive out of my neighborhood into the adjoining big city,

      Drive back to my neighborhood (probably on different roads, but maybe not),

      Walk in through my unlocked front door,

      And into the kitchen (meeting a huge crowd of people)?



    "Have unprotected sex with a prostitute" should be in the middle there somewhere.

    <font face="Tahoma">And when you got home, it might get "deleted" when the virus is detected...



    </font>

    Or the wife deletes the worm.
  • (cs) in reply to Alex Papadimoulis
    Alex Papadimoulis:

    It would be nice if every submission came with a complete and certified "OK to post" back-story (like More Rube Goldberg, http://thedailywtf.com/forums/thread/73438.aspx), but they don't, nor do I expect them to given the small chance (10-15 submissions a day) of making it on the front page. So, this leaves me to fill in the back story with (what I believe to be) superfluous details that I've gleaned from other submissions and my personal experience.



    Alright, I understand the motivations and constraints you are under to post an entertaining, if fabricated, story that is accessible to as many readers as possible.  But you don't present the stories that way; you present them as "Here's what happened to A. Schmuck."  In truth, that's not what happened to A. Schmuck at all.  It is, as you said, a lot like the "based on a true story" documentaries, but you leave out the "based on a true story" disclosure, which is more than a little disingenuous.  Movie producers aren't allowed to get away with that.  So how about an introductory line more like this: "Here's a story I made up that could just as easily have happened to A. Schmuck, in a parallel universe."

  • BLKMGK (unregistered) in reply to dept non style dep
    Anonymous:
    I know a location where "windows network connection" is banned so printers cant be shared.

    The standar way to get something printed is:

    1) Use the "print as pdf" option
    2) Upload the file to a public website incomming folder
        (trough FTP or a upload.asp file )
    3) walk to the computer with printer
    4) Open a web browser
    5) Open the incomming folder, and open your document pdf file
    6) Print

    Often users make mistakes, so this cycle is repeated 3 o 4

    This is not as good has teh Linux Torbalds method to backup his kernel source :(  (let others mirror it).

    --Tei


    Seems like using a printer that supports FTP would be a terrific way to solve this situation - aside from allowing the needed protocol....

    CAPTCHA: stfu
  • (cs) in reply to The 2-Belo
    Anonymous:
    Alex Papadimoulis:

    He confirmed that the servers and workstation did, in fact, communicate with each other over the Internet.

    I was just sitting here wondering how many of these servers there were, and how much this outfit was paying to keep them all in global IP addresses in this day and age. Then I started to think about the WORKSTATION having a global IP so it could talk to its own servers via the internet even though it was just a few feet away, and if not how it was being mapped through multiple daisy-chained routers, and oh dear I think I have to go lay down for a while.

    CAPTCHA Test: foxtrot. Now all I need is a whiskey and a tango.

    - 2

    Oh, I worked at a place like that.  I wasn't doing any computer-related work (aside from using one), but they picked up on my being a Computer Science major, and, since that obviously meant I was well-versed in every single piece of software ever written (whether I'd seen it before in my life or not), they decided to tap me for help with the process of upgrading the crazy, seemingly archaic inventory management software they used.  They called me in because they needed each workstation's network configuration set with specific addresses, and didn't know how to do that.  Since there were only five workstations, I figured it'd take ten minutes total...that is, until I realized that the list of IP addresses they gave me were all public addresses.  I didn't know a whole lot at the time about networking, but it didn't sound right that each machine should have its own public, static address considering none of them were actually serving anything (and certainly nothing that the entire internet needed access to).

    At some point they got the software developer on the phone so they could remotely upgrade the server.  The support guy asked "I need to reconfigure your firewall, what's the password?", at which point the phone was promptly handed to me because, again, Computer Science majors know the passwords to all the firewalls in the world.  He asked his question again, I answered with "I...don't...know.  I don't really work here." (more for the benefit of the person who'd handed me the phone than the person on the other end of it), and I handed the phone back.  Anyways, once the information that I had no way of knowing had been exchanged, I get back on the phone with the support guy and he confirmed my suspicions: SBC had sold them static IP addresses for the server and each of the five workstations rather than just one for the router.  Either that, or they really were clueless/(mis)informed enough to ask for something they didn't need, and SBC happily went along with it.

    Amazingly, all of the machines used the LAN - not the internet - to communicate with each other, and they all did so using TCP/IP, too.  There also wasn't a clueless IT guy to blame, but that's probably merely because they had no in-house IT guy.  I do remember, though, that a few employees had the "two workstations to access two different inventory systems through two separate Windows applications at the same time (jeepers!)" setup like someone else already mentioned.  Oh, and every single keyboard in that place was brown and sticky from people being careless with their coffee.  Except for mine, where the 4 and right arrow keys didn't work (among others), which made writing text and HTML a lot of fun.

    I hear they went bankrupt just recently.  It's too bad all that unnecessary equipment and services can't be liquidated like everything else was.
  • HAS (unregistered)

    Okay,

    The network was probably not TCP/IP.  We got that.  And the prev Admin setup file shares over the internet.   Wonder if he is the guy I have been sending print request to over the years.  And now you know the client needs to upgrade the file server and network.

    But what you and everyone else seems to have missed.   YOU didn't do a good site evaluation or non at all.  Depending on your service contract you could have been in the hole more than 10 hours.  And you would of made a copy of the floppy or changed that method. Say what you will, but in the old dos boot sector virus days a write protected boot floppy was a good way to keep the compsec files from being corrupted.  Perhaps you should think about min standards for contracted clients and working on Documentation of client sites.


    I would burn that document that says reboot everything also and brain wash everyone that remembers it.



  • (cs) in reply to Bus Raker
    Bus Raker:
    Bus Raker:
    My guess is that the network was made out of spare parts from the guy's University job .. his Rube Goldberg attempt at abstract network topology art.  If you connect the circles between the iner-connected NIC cards it spells out a secret message about satin.
    Oops .. meant 'satan'.  Looking at it though .. I kind of like satin better anyway.

    Aww, you disappoint me - I thought you were just displaying some inspired wit. After all, if this particular 'sysadmin' did want to spell out messages about Satan, isn't it far more likely he'd end up with "satin" instead?

    Pete

  • bean (unregistered)

        The internet is not something you just dump something on.  It is not a truck.  It's a series of tubes.  And if you don't understand those tubes can be filled and if they are filled, when you put your message in, it gets in line and its going to be delayed by anyone that puts into that tube enormous amounts of material, enourmous amounts of material.

    Somebody sent me an internet a week ago, and I just got it last Friday.

  • Newtman (unregistered)

    Admins like this should be lined up and shot. 

Leave a comment on “That's What the Internet Is For”

Log In or post as a guest

Replying to comment #:

« Return to Article