Linux nerd and consultant. Sci-fi, comedy, and podcast author. Former Katsucon president, former roller derby bouncer. http://punkwalrus.net

  • 0 Posts
  • 158 Comments
Joined 1 year ago
cake
Cake day: June 22nd, 2023

help-circle


  • “Decline.”

    Working in IT, I have learned that a lot of meetings are by people who gain “respect and notoriety” by having large meetings. It doesn’t matter who shows up, it’s the number, that makes them seem popular. “Get the engineers in here, this is serious business!” You begin to learn which PMs do this, and can respond (or not) accordingly. If they ping you “where are you?” you can say, “I am in an [client] audit call. I cannot leave this call while the audit is taking place.” Or whatever your industry equivalent is. YMMV, some toxic environments I have been in, this was not possible.

    I remember one PM was frozen in indecision. I had to tell him, “I can fix the problem, or having a meeting about it. Pick one.”

    “Well, both–”

    “No. I can fix the problem, or having a meeting about it. Pick one or the other.”

    “I need you in this meeting!”

    “When we explain to the customer that the fix was delayed by an hour, I can use YOUR name, as having a meeting about it instead of fixing it, correct?”

    “The meeting is to be about fixing it!”

    “No. I can fix the problem, or having a meeting about it. Pick one or the other.”

    “… we can have the meeting in your office, then.”

    Eventually, my boss shooed him away.


  • Someone did a study at MIT about tin foil hats, and found that not only do they not screen radio interference, in some cases, can actually magnify them.

    Conclusion: The helmets amplify frequency bands that coincide with those allocated to the US government between 1.2 Ghz and 1.4 Ghz. According to the FCC, These bands are supposedly reserved for ‘‘radio location’’ (ie, GPS), and other communications with satellites (see, for example, [3]). The 2.6 Ghz band coincides with mobile phone technology. Though not affiliated by government, these bands are at the hands of multinational corporations. It requires no stretch of the imagination to conclude that the current helmet craze is likely to have been propagated by the Government, possibly with the involvement of the FCC. We hope this report will encourage the paranoid community to develop improved helmet designs to avoid falling prey to these shortcomings.


  • Probably HR (or the NCS equivalent) never told the right people. I am not saying this is actually what happened, but a lot of IT bemoan the fact they are never told some rando employee was fired because HR neglects to inform them. Sometimes it takes months to discover, and even with a 90 day password/login lockout, some halfway decent admin could get around this by secretly building a back door, and using the messed up communication and politics between departments to hide this. Even in the 1990s, I saw people put in “time bombs” in their code that “if such and such is not updated in 6 months, run destructo-script A.”

    But imagine someone like Kandula Nagaraju here. Worked in QA, probably did a great jobs with some skills, but had the personality of swallowing broken glass. He was terminated in October 2022 due to “poor work performance,” which could mean anything. “Not a team player.” Or maybe he really was an idiot: I mean, a smart person would have a conniption, but get employed elsewhere and then slam his former company at parties. “Those NCS folks didn’t know what they had with me!” But this guy was probably someone with some anger management issues, probably a jerk, and possibly stupid. He might have had revenge fantasies, and set up a small virtual server posing as a backup code mirror. But outside the audits, it allowed ssh from the outside, and hid it through a knockd daemon. Or maybe only launched ssh at certain hours before shutting it down again. Silently working away in a sea of virtual servers with little to no updated documentation. He gets in, has internal access, and runs a script with admin credentials because they don’t rotate their AWS keys/secrets quickly enough. Or didn’t even know he was let go.

    After Kandula’s contract was terminated and he arrived back in India, he used his laptop to gain unauthorised access to the system using the administrator login credentials. He did so on six occasions between Jan 6 and Jan 17, 2023.

    That’s embarrassing to the company. Not only did he get in, but SIX TIMES after he was let go. he probably knew what order to run the delete commands (like, say, an aws “terminate-instances” cli command from a primary node), and did so one by one, probably during hours with the least amount of supervision, where the first few alerts would take hours to get someone in the monitoring chain to wake an admin. Given his last day was in November, and he got back in January, the admins probably thought their 90 access credential rotation was “good enough,” but he got in on his 80th day or whatever.

    I know this because I have had to do triage when a former contractor did this to a company I worked for. But instead of wiping out instances, he opened a new set of cloud accounts from the master account, put them in an unmonitored region (in this case, Asia), and spun up thousands of instances to run bitcoin mining. Only because AWS notified us of “unusual traffic” were we made aware at all, and this guy knew his shit and covered his tracks very well. He did it at a speed that could have only been automated. Thankfully, AWS did not charge us the seven figure amount that this activity amassed in just three days.


  • I remember hearing that some Hollywood contracts require that if you sign up for some studio, you must make X amount of films. Big stars get to chose those films to some degree, but once in a while, they have to do “a stinker” to end the contract as “X amount of films done, okay?” or something. Contractual Obligation and all. This film feels like a dumping ground of a lot of those contractual obligation hires from the trailer alone.


  • That doesn’t even cover the issues of explaining how they figure out what DAY it is every year.

    “Okay, so they start by figuring out when the Earth has the most direct sun on the the Tropic of Cancer… no, not the disease, a giant crab… it’s a line of latitude approximately 23°27′ north of Earth’s Equator, right? Yes, there’s math. Anyway, the take the day the sun is strongest and weakest, called the solstices, and … the solstices… It doesn’t matter, It mattered for agriculture back then, especially when spring and fall were, which are the calendar dates in between them, yeah? So the spring equinox ,., that’s what they call the ‘in between solstices,’ equinox… which is March 21st or 22nd or something. What? No no, I am explaining how they figure out when easter is. I haven’t forgotten. So now we know when the spring equinox is, so now we look at a chart of the moon, and figure out when it is full. Full. No, not ‘full of what?’ it’s full meaning that you can see all of in the sky. Well one half of it, actually. The sunlit half, but it’s FACING us, see… The sun lights up and it shows as a circle instead of a crescent or something. Moving on, they look at the FIRST Sunday AFTER the FIRST full moon that occurs on or after the spring equinox. Except if the full moon falls on a Sunday, then Easter is the next Sunday. Why? Well, St. Bede the Venerable, the 6th-century author of Historia ecclesiastica gentis Anglorum (‘Ecclesiastical History of the English People’), maintains that the English word ‘Easter’ comes from Eostre, or Eostrae, the Anglo-Saxon goddess of spring and fertility. That’s where the Spring Equinox comes in. NO I AM NOT MAKING THIS UP!”


    1. Things like CNC machines and proprietary interfaces to TOL equipment, like bus fare systems, message boards, etc.
    2. Don’t connect them to the Internet (most can’t, anyway, but some systems use a run-of-the-mill PC, so…)
    3. Don’t install anything on them that wasn’t supposed to be installed, even wallpaper as this could fuck up the resolution of a small 240 x 180 screen




  • Punkie@lemmy.worldtoNo Stupid Questions@lemmy.worldXXX
    link
    fedilink
    arrow-up
    2
    arrow-down
    2
    ·
    3 months ago

    I can see that being very possible. You see this when taxes are levied to “improve something” and then that money doesn’t go to that something in a directly helpful way. And then the budget that is the main staple of survivability of that something is kept static because of the “new influx.”

    For example, say that you have a toll road increase to help the infrastructure of your roads. Say your Annual Budget for Transportation is $50mil for 2021. In 2022, you requested $60mil. You decide to implement tolls in new ways and increase tolls in other ways (like fines, mileage taxes, and so on) to make up that shortfall. This brings in an additional $10mil, let’s say, in 2022. The revenue is forwarded to 2023. But in 2023, you actually need $80mil because of the two years of shortfalls where it stayed at $50mil, yet costs continued to increase. That $10mil from 2022 now puts you $10 mil behind in 2023. The fact that the previous budget needed steady increases were ignored because “well, we’ll just make things more expensive to make up 2022’s shortfalls of the $60mil request.”

    That’s IF that $10mil isn’t siphoned for other things. Fresh money brings fresh ways to spend it. Grifters via backroom contracts to “fix roads” that go over budget with nothing to show for it. So these new fees and increases actually made things worse due to no oversight.

    So yeah, I could totally see UBI being siphoned off by similar things.



    • The grandson of an amateur naturalist rejects the church, and hooks up with a Southern Chicago native, resulting in a breach of intricate personal human data the scope of which could be disastrous.
    • A boy nicks a ticket punch from a bus operator, and now I have to attend mandatory training on social engineering.
    • Someone figured out how to store electricity in rocks, and now democracy is being threatened by liars


  • The thing is that for a majority of cases, this is all one needs to know about git for their job. Knowing git add, git -m commit “Change text”, git push, git branch, git checkout , is most of what a lone programmer does on their code.

    Where it gets complicated real fast is collaboration on the same branch. Merge conflicts, outdated pulls, “clever shortcuts,” hacks done by programmers who “kindof” know git at an advanced level, those who don’t understand “least surprise,” and those who cut and paste fixes from Stackexchange or ChatGPT. Plus who has admin access to “undo your changes” so all that work you did and pushed is erased and there’s no record of it anymore. And egos of programmers who refuse any changes you make for weird esoteric reasons. I had a programmer lead who rejected any and all code with comments “because I like clean code. If it’s not in the git log, it’s not a comment.” And his git comments were frustratingly vague and brief. “Fixed issue with ssl python libs,” or “Minor bugfixes.”




  • I was burned afoul by a former admin who, instead of diagnosing why a mail service was failing, labeled a script as a /etc/cron.d file entry as “…” (three dots) which, unless you were careful, you’d never notice in an "ls " listing casually. The cron job ran a script with a similar name which he ran once every 5 minutes. It would launch the mail service, but simultaneous services were not allowed to run on the same box, so if it was running, nothing would happen, although this later explained hundreds of “[program] service is already running” errors in our logs. It was every 5 minutes because our solarwinds check would only notice if the service had been down for 5 minutes. The reason why the service was crashing was later fixed in a patch, but nobody knew about this little “helper” script for years.

    Until one day, we had a service failover from primary to backup. Normally, we had two mail servers servers behind a load balancer. It would serve only the IP that was reporting as up. Before, we manually disabled the other network port, but this time, that step was forgotten, so BOTH IPs were listening. We shut down the primary mail service, but after 5 minutes, it came back up. The mail software would sync all the mail from one server to the other (like primary to backup, or reversed, but one way only). With both up, the load balancer just sent traffic to a random one.

    So now, both IPs received and sent mail, along with web interface users could use. But now, with mail going to both, it created mass confusion, and the mailbox sync was copying from backup to primary. Mail would appear and disappear randomly, and if it disappeared, it was because backup was syncing to primary. It was slow, and the first people to notice were the scant IMAP customers over the next several days. Those customers were always complaining because they had old and cranky systems, and our weekend customer service just told them to wait until Monday. But then more and more POP3 customers started to notice, and after 5 days had passed, we figured out what had happened. And we only did Netbackups every week, so now thousands of legitimate emails were lost for good over 3000 customers. A lot of them were lawyers.

    Oof.


  • Having bridged both worlds, here’s how they are viewed as described by a few people that stuck with me all these years.

    The first one I “go to thought” was more than one person is “awkward.” Some even describing them “out of step, socially.” Imagine a clock that is running fast or slow, but you have mentally compensated because generally, you can adapt depending on other clues. But they are always off, and you might have to warn others ahead of time.

    Another comment was how autistic personalities are in that “uncanny valley of behavior” where people notice something is off, and it can be frightening but they are not sure why. Since autism is a spectrum of behaviors, which approach depends subjectively on the viewer. Kids, for example, can target autistic kids, and because they are developing socially, will group in “us” and “not us.” Autistic kids are “not us,” and the target of bullying. A lot of teachers know autistic kids just by how they are treated by others. “You’re too weird,” was something a lot of kids might say with developing language skills. The may not know WHY they hate a certain kid, but know that they DO. And “something is wrong.”

    Personally, I see autism as some kind of evolutionary response to a civilization that is growing faster that humans can compensate. In order to get actual insight, one has to be “out of step,” lest they just end up trapped in the normal static of everyday compulsion. Like any other evolutionary advance, nature is “trying out” various things. Most will lead to dead ends. A few will adapt in other ways, and some will flourish in a new niche with new types of diversity. I have no proof of this, but I think it’s more than “well, we define autism differently now.” Yes, there were always people who were “touched by fae” or whatever convention was explained back in the day, but something has really changed. I personally think this and gender fluidity is a positive sign of things to come.