- Feature Articles
- CodeSOD
- Error'd
- Forums
-
Other Articles
- Random Article
- Other Series
- Alex's Soapbox
- Announcements
- Best of…
- Best of Email
- Best of the Sidebar
- Bring Your Own Code
- Coded Smorgasbord
- Mandatory Fun Day
- Off Topic
- Representative Line
- News Roundup
- Editor's Soapbox
- Software on the Rocks
- Souvenir Potpourri
- Sponsor Post
- Tales from the Interview
- The Daily WTF: Live
- Virtudyne
Admin
"Why can't I install my internet to /dev/null?"
Admin
The real WTF is Linux, amirite?
Admin
No, it's great! War of the worlds leading to deadlock = Warlock. TRWTF is not implying use of the blessed hammer on the blessed software.
Admin
Yeah, they should have had some butter testing with it for sample group of users.
Admin
All good thing can be found in bars. So the moral of story is keep visiting bar during office hours. I will now speak with my manager.
Admin
I fear the solution was about that simple. Just 2 different whitelists competing back and forth.
Admin
Let's see, 32GB storage, 1GB Ram, 1.4Ghz quad-core processor, multitasking, multiuser Operating System, supports keyboard, monitor and mouse, 3D video acceleration, USB support, networking.
That's a more capable PC than half the "PCs" in my house, and has the bonus of only being 5" diagonal and less than a cm thick, with built in screen and pointing device when I don't have it docked.
About the only difference I see, is the CPU is ARM, not x86 - but x86 isn't what makes something a PC.
Admin
I'm in the same boat as him, and when people ask for assistance to install another browser instead of IE, they would generally prefer Firefox, which they can't really work with due to Policy issues. I'm not saying one is better then the other, but I end up having to drop Chrome instead because we can't support Firefox.
Admin
All this you said can be done with registry subtree, you only need one tool to transform it to a text format. It behave like a database, its encapsuled, you need to use regular tools to access it, not that this prevents corruption. Windows registry is a database, not a text file. It has all burdens such thing has, but it has benefits. Like standard access routines, on linux config, every file has a fucking different sintax that you must learn, also, you cant easilly parse it. with Windows registry, no parse needed, just plain C compiler, include windows header and 4 function calls to recursive load keys/values. Also about firefox, i think you are correct, they cant stabilize config, it all sucks. But they can make some interface to control security, and like an external API, make that static, then througth it you change the fucked configuration of firefox.
Admin
I said computers. Last I checked, phones are not computers.
Admin
Linux is not a PC operating system? What, have the Linux geeks gone the way of the Mac elite?
Admin
So, anyway, with all this talk of "blessed" software... which side was the Catholics and which was the Protestants? :)
Admin
Just made my day.
Admin
Admin
TRWTF is nobody in the entire building disconnecting their machine from the network, booting it and then reconnecting to the network.
Admin
Admin
Firefox stores its configuration entries in a json file so the order or parameters should not be an issue Provideing you are using a json parser & not just manually reading the file line by line
Admin
Like x86 compatibility.
Or A20-gate
Admin
Why do you need to prevent the user from changing their browser settings? Why is this considered a desirable feature? I'm guessing approximately zero users have asked you to prevent them from changing their settings, correct?
Admin
I saw a similar issue before at a just-merged company...only difference being that it was 2 different Windows programs fighting each other instead. Computers simply never got to the desktop after you logged in.
The story was this (sorry it's so long, but there's probably enough WTF to make it worth reading):
Company A had just merged with Company B a year earlier. Both were Windows networks. Initially, A & B's IT systems stayed separate. The few employees that needed access to both company's systems had two laptops, one A, one for B.
The issues started when A & B finally decided to combine them.
Company A had used an off-the-shelf network management product and ERP package. B used a home-grown system called RDL, something best thought of as an ERP-wannabe and the base framework on which almost everything at company B ran. The network & PC configuration manager was built in it, as was helpdesk ticketing, accounting system, manufacturing, inventory, sales, etc. Just about all (except payroll, outsourced) systems were in RDL.
Because many employees from B (mostly sales, billing, and plant workers) liked the RDL system, it had been decided that RDL would be kept in those areas, and Company A's ERP would replace it in the others. Management decided they would use A's very strict, paranoid computer policies, enforced by A's management software, in place of B's lax policy (B gave employees full admin rights to their assigned laptop, and only mandated a provided AV, disk encryption product, and remote support program).
The changes and new configurations were deployed over a weekend after months of testing, and would install on employee laptops on Monday at login.
On that Monday, employees began arriving. They logged in, the new management software installed at logon, then began updating their system with approved software and policies. Both RDL and Company A's ERP were "approved", as was a pile of typical stuff (updates, Office, etc.)
Since several departments were keeping RDL, it was still on their PCs (it had been removed from others where the ERP was replacing it). RDL was designed to remove incompatible programs and install updates to itself at startup. It saw the software installed by company A's management system, and removed part of A's ERP program. It also installed its own updates (which had also been deployed that weekend).
Company A's software promptly noticed the removal and updates, then proceeded to reinstall the missing program and downgrade the updated components since they were unapproved. The PCs froze at a blank desktop (think when explorer dies) as the management software and RDL fought it out, each repeatedly reversing the other's action. 23 manufacturing plants, billing, and the entire sales department could do nothing. Helpdesk was flooded with calls.
After about 2 hours, upper management finally decides to have a meeting with lower management and the deployment team. The end result was "Undo everything you did this past weekend, NOW!" Management in IT was never fast to make decisions (often a month or so for the most basic things), but we had approval to un-deploy that configuration in <5 hours that day.
A week later it was learned that nobody on the deployment team (they were from A) knew anything about RDL (a product of B), so they decided to just leave it out of the test environment figuring it wouldn't be an issue. It was also discovered that the strict policies they deployed would've broken several features in RDL had the deployment succeeded.
End result? The week before I left (I was an intern mostly doing helpdesk & desktop support), they deployed the opposite of what they originally planned: Put B's lax policies on A's systems and do away with A's management software. It worked perfectly. Devs had also fixed the incompatibility and got RDL and the ERP package to communicate and work together.
Admin
Last time I checked Firefox can install in the user profile just as well, at least on W7 and WXP. Just click cancel when the 'please login as admin' message shows.
Admin
Admin
One who wants to keep their job.
Admin
Extraordinary. It's like we're living in the past ...
Admin
Not that I would know anything about that.
Admin
A more likely solution was that the developers actually used samba mounts to install windows software. A mounted drive works just as a normal drive, so you can install software on them just as easily as any other drive.
If the software removal program only scanned C:\ it would be a nice workaround that enabled developers to install what they needed.
Admin
We once lost storage on our biggest repository server holding all the source code, but also the central repository of intermediate artefacts needed during builds. It turned out that a full backup was only taken once a quarter - and we were just before the end of the quarter. So after the day or two it took to restore the full backup, it took another two or three weeks to restore 10 weeks of daily incremental backups ...
The outages costing only a full working day were typically something minor, like loss of home directories...