178
submitted 3 months ago* (last edited 3 months ago) by gnutard@sh.itjust.works to c/asklemmy@lemmy.ml
top 50 comments
sorted by: hot top controversial new old
[-] Blizzard@lemmy.zip 131 points 3 months ago

My current company has a script that runs and deletes files that haven't been modified for two years. It doesn't take into account any other factors, just modification date. It doesn't aks for confirmation and doesn't even inform the end user about.

[-] Kimjongtooill@sh.itjust.works 87 points 3 months ago

You should write a script to touch all the files before their script runs.

[-] Blizzard@lemmy.zip 25 points 3 months ago

Thought about it but I use modification date for sorting to have the stuff I've recently worked on on top. I instead keep the files where the script isn't looking. The downside is they are not backed up so I might potentially lose them but if I don't do that, then I'll lose them for sure...

[-] Perhyte@lemmy.world 29 points 3 months ago

You don't actually have to set all the modification dates to now, you can pick any other timestamp you want. So to preserve the order of the files, you could just have the script sort the list of files by date, then update the modification date of the oldest file to some fixed time ago, the second-oldest to a bit later, and so on.

You could even exclude recently-edited files because the real modification dates are probably more relevant for those. For example, if you only process files older than 3 months, and update those starting from "6 months old"^1^, that just leaves remembering to run that script at least once a year or so. Just pick a date and put a recurring reminder in your calendar.

^1^: I picked 6 months there to leave some slack, in case you procrastinate your next run or it's otherwise delayed because you're out sick or on vacation or something.

load more comments (1 replies)
[-] Reverendender@sh.itjust.works 17 points 3 months ago

Have you…called attention to this at all?

load more comments (2 replies)
[-] brygphilomena@lemmy.world 17 points 3 months ago

What industry are you in. This could be compliance for different reasons. Retention is a very specific thing that should be documented in policies.

I know financial institutions that specifically do not want data just hanging around. This limits liability and exposure if there is a breach, and makes any litigation much easier if the data doesn't exist by policy.

Should they be more choosy on what gets deleted, yea probably. But I understand why it's there.

load more comments (4 replies)
[-] mozz@mbin.grits.dev 101 points 3 months ago* (last edited 3 months ago)

Startup in a rented house in a residential neighborhood

“Router” was an old PC running Linux with a few network cards, with no case, with a household fan pointed at it to keep it cool

Loose ethernet cables and little hubs everywhere

Every PC was its own thing and some people were turbo nerds. I had my Linux machine with its vertical monitor; there were many Windows machines, a couple Macs, servers and 2 scrounged Sun workstations also running Linux

No DHCP, pick your own IP and tell the IT guy, which was me, and we’ll set you up. I had a little list in my notebook.

It was great days my friends

We went out of business; no one was shocked

[-] LodeMike@lemmy.today 28 points 3 months ago

with a household fan pointed at it to keep it cool

It had a CPU fan, right?

[-] MummifiedClient5000@feddit.dk 18 points 3 months ago

I kind of want to work there though.

[-] mozz@mbin.grits.dev 20 points 3 months ago* (last edited 3 months ago)

It was the best of times, it was the worst of times. I turned in a time card once that had over 24 hours of work on it in a row. The boss was dating a stripper, and she would sometimes bring stripper friends to our parties and hangouts. We had ninja weapons in the office. The heat was shitty, so in the winter we had to use space heaters, but that would overload the house’s power which would cause a breaker to blow which obviously caused significant issues, so a lot of people would wear coats at their desks in the winter, but that obviously doesn’t do much for your typing fingers which was an issue. I frequently would sleep in the office on the couch (a couple of people were living in bedrooms in the upstairs of the house).

Like I say, it’s not surprising that we went out of business. It was definitely pretty fuckin memorable though. Those are just some of the stories or right-away memorable pieces off the top of my head.

load more comments (1 replies)
load more comments (9 replies)
[-] j4k3@lemmy.world 74 points 3 months ago

Coffee shop open WiFi on the same network as the main retail central point of sale system server for several stores.

[-] biscuitswalrus@aussie.zone 19 points 3 months ago

Transport layer security should mean this shouldn't matter. A good POS shouldn't rely on a secure network, the security should already be built in cyptographically at the network session layer. Anything else would still have the same risk vector, just a lower chance of happening.

In fact many POS systems happily just take a 4g/5g sim card because it doesn't matter what network they're on.

load more comments (3 replies)
load more comments (1 replies)
[-] foggy@lemmy.world 73 points 3 months ago* (last edited 3 months ago)

I have posted about this before. I'm pretty sure I win.

I'm not going to name names. I worked for a company, three of their clients include the United States Air Force, the United States army, and the United States Navy. They also have a few thousand other clients, private sector, public, and otherwise. Other nation states services as well.

I worked for this company quite recently, which should make what I'm about to tell you all the more alarming. I worked for them in 2021.

Their databases were ProgressABL. I linked it because if you're younger than me, there's a slim chance in hell you've ever heard of it. I hadn't. And I'm nearing 40.

Their front end was a bunch of copy/pasted JavaScript, horribly obfuscated with no documentation and no comments. Doing way more than is required.

They forced clients to run windows 7, an old version of IE, all clients linked together, to us, in the most hilariously insecure 1990s-ass way imaginable, through tomcat instances running on iis on all their clients machines.

They used a wildcard SSL for all of their clients to transact all information.

That SSL was stored on our local FTP server. We had ports forwarded to the internet at large.

The password for that ftp server was 100% on lists. It was rotated, but all of the were simple as fuck.

I mean, "Spring2021". Literally. And behind that? The key to deobfuscate all traffic for all of our clients!!

The worst part was that we offered clients websites, and that's what I worked on. I had to email people to have them move photos to specific directories to get them to stop failing to load, because I didn't have clearance to the servers where we stored our clients photos.

We had legit secure servers. We used them for photos. We left the keys to the fucking city in the prize room of a maze a 12 year old could solve.

Holy shit.

load more comments (5 replies)
[-] Xaphanos@lemmy.world 60 points 3 months ago

My current job.

Many SQL servers use scripts that run as domain administrator. With the password hard coded in.

Several of the various servers are very old. W2K, 2003, 2008. SQL server, too.

Several of the users run reports via rdp to the SQL server - logging in as domain admin.

Codebase is a mashup of various dev tools: .net, asp, Java, etc.

Fax server software vendor has been out of business for a decade. Server hardware is 20 years old. Telecom for fax is a channelized PRI carrying POTS - and multiport modem cards.

About a 3rd of the ethernet runs in the office have failed.

Office pcs are static IP. Boss says that's more secure.

We process money to/from the Fed.

[-] brygphilomena@lemmy.world 15 points 3 months ago

The last line was the least surprising after hearing all that.

load more comments (1 replies)
[-] calamityjanitor@lemmy.world 57 points 3 months ago

My partner worked for a local council. They reset your password every 90 days which prevented you from logging in via the VPN remotely. To fix it you'd call IT and they'll demand you tell them your current password and new password so they can change it themselves on your behalf.

Even worse, requesting a work iphone meant filling out an IT support ticket. So that IT could set up your phone for you, the ticket demanded your work domain username and password, along with your personal apple account username and password.

[-] nicerdicer@feddit.org 14 points 3 months ago

along with your personal apple account username and password.

I would never ever share my personal Apple account with work related things. I prefer to have my private stuff seperated from work related things.

I once worked for a small company that had such a setup: All devices were Apple, and everything was connected with the company owners private Apple accounts. That means that I was able to see personal calendars and to an extend some email-related things - Things that reveald more about a person than you wanted to know.

[-] philpo@feddit.org 55 points 3 months ago

Saw a mid size clinic where the server was also the personal desktop of the boss - who also used the domain admin user as his main user account. His reasoning was that he needed to see "everything" his employees did and that none must come "above him" IT wise.

And before I forget it:The machine was in his office where he still was seeing patients and where often patients were left unattended - without him locking the machine.

[-] NABDad@lemmy.world 42 points 3 months ago

It's it too soon to say, "letting Crowdstrike push updates to all your windows workstations and servers"

load more comments (2 replies)
[-] some_guy@lemmy.sdf.org 40 points 3 months ago

We make users change their passwords every 90d. And log them out of their devices once a week. I don't think this adds any security at all. It just reduces productivity (IMO).

[-] Godort@lemm.ee 39 points 3 months ago* (last edited 3 months ago)

Not only does password rotation not add to security, it actually reduces it.

Assuming a perfect world where users are using long randomly generated strong passwords it's a good idea and can increase security. However, humans are involved and it just means users change their passwords from "Charlie1" to "Charlie2" and it makes their passwords even easier to guess. Especially if you know how often the passwords change and roughly when someone was hired.

Ideally, your users just use a password manager and don't know any of their credentials except for the one to access that password manager.

If they need to manually type them in, password length should be prioritized over almost any other condition. A full sentence makes a great unique password with tons of entropy that is easy to remember and hard to guess.

load more comments (1 replies)
[-] flamingo_pinyata@sopuli.xyz 36 points 3 months ago

Source control relying on 2 folders: dev/test and production. Git was prohibited due to the possibility of seeing the history of who did what. Which made sense in a twisted way since a previous boss used to single out people who made mistakes and harras them

[-] barsquid@lemmy.world 38 points 3 months ago

When you lift up the red flag and there are more red flags underneath.

load more comments (1 replies)
[-] InFerNo@lemmy.ml 14 points 3 months ago

Just share a git user, come on. Have everyone check in under the same name "development" or whatever, but no version control whatsoever?

[-] Crackhappy@lemmy.world 33 points 3 months ago

Wells Fargo. I worked for them for a few years and I have never banked with them after witnessing the travesty of inefficiency and incompetence, literally in my face.

load more comments (10 replies)
[-] wintermute@discuss.tchncs.de 30 points 3 months ago

I was hired to implement a CRM for an insurance company to replace their current system.

Of course no documentation or functional requirements where provided, so part of the task was to reverse engineer the current CRM.

After a couple of hours trying to find some type of backend code on the server, I discovered the bizarre truth: every bit of business logic was implemented in Stored Procedures and Triggers on a MSSQL database. There were no frontend code either on the server, users have some ActiveX controls installed locally that accessed the DB.

load more comments (2 replies)
[-] CrabAndBroom@lemmy.ml 27 points 3 months ago

I had a boss at an animation company (so not exactly a hub of IT experts, but still) who I witnessed do the following:

  • Boot up the computer on her desk, which was a Mac

  • Once it had booted, she then launched Windows inside a VM inside the Mac

  • Once booted into that, she then loaded Outlook inside the Windows VM and that was how she checked her email.

As far as I could ascertain, at some point she'd had a Windows PC with Outlook that was all set up how she liked it. The whole office then at some point switched over to Macs for whatever reason and some lunatic had come up with this as a solution so she wouldn't have to learn a new email thing.

When I tried to gently enquire as to why she didn't just install Outlook for Mac I was told I was being unhelpful so I just left it alone lol. But I still think about it sometimes.

[-] linearchaos@lemmy.world 14 points 3 months ago

I'm not certain that it's still the case but several years ago Outlook for Mac was incapable of handling certain aspects of calendars in public folders shared groups and there was some difficulty with delegation send as.

At the time the best answer I had was for the Mac users to use Outlook as much as possible and then log into webmail when they needed to send us. It's been a few years so I can't help but think it's been fixed by now. Or the very least equally broken on PC.

[-] superkret@feddit.org 26 points 3 months ago* (last edited 3 months ago)

A company making signage and signal lights for road construction, with 15 employees. Their former IT guy had switched all of their PC's to Linux for ideological reasons and to save money.
Then they found out that they had a long term contract for an accounting software that housed all their customer and billing data, only ran on Windows and required a server-client model.

So they hauled in the boss's private laptop which ran Windows 7, and installed both the server role, database and client software on it. When his employees needed to access the accounting software, the boss had to stop what he was doing and grant them full access to his laptop via teamviewer. When the boss's laptop was off or he was on vacation, there was no way to access any price info, customer contact info, or financial data (This was during Covid when everyone was working from home).

The laptop was set up to back up (using Windows 7's integrated backup tool) to an external drive which wasn't attached and no one remembered ever existing.

The Linux server (which was actually a gaming PC) was running and attached to an MCU when my company surveyed their infrastructure, but no one (including the former IT guy) knew the correct root password, and we never found out what it was even doing.

load more comments (4 replies)
[-] Epzillon@lemmy.ml 26 points 3 months ago

Using Filezilla FTP client for production releases in 2024 hit me hard

load more comments (6 replies)
[-] SuperiorOne@lemmy.ml 25 points 3 months ago

I was a backend developer for a startup company where:

  • Windows servers without any firewall and security hardening.
  • Docker swarm without WSL. We had to use 4 GB Windows base images for 50MB web apps.
  • MSSQL without any replication and backups.
  • Redis installed on Windows via 3rd-party tool that looked like a 2010 era keygen generator.
  • A malware exploited the Redis * what a surprise * and kept killing processes to mine crypto on CPU...
  • VPS provider forgot to activate new Windows Server on production and it kept restart for every 30 minutes until I checked the logs and notified them about the missing license.

I left there after 6 months.

[-] ikidd@lemmy.world 18 points 3 months ago

The blind determination to use a desktop OS to do a server's job.

[-] thurstylark@lemm.ee 25 points 3 months ago

Freight shipping company still running on a custom AS400 application for dispatch. Time is stored as a 4-digit number, which means the nightside dispachers have their own mini Y2K bug to deal with every midnight.

On one hand, hooray for computer-enforced fucking-off every night. On the other hand, the only people who could fix an entry stuck in the system because of this were on dayside.

Apparently, this actually isn't uncommon in the industry, which I think is probably the worst part to me.

load more comments (1 replies)
[-] solomon42069@lemmy.world 25 points 3 months ago

One of my ex employers sold a construction company a six figure "building logistics system" which was just a Microsoft Access file. And the construction dudes had to use a CDMA dongle to remote desktop into a mainframe to open their access files. A travesty.

[-] MeetInPotatoes@lemmy.ml 23 points 3 months ago

A behavioral health company with 25 iPads deployed to field employees as patient data collection devices all signed into the same iCloud account instead of using MDM or anything.

They all had the same screen lock PINs and though most of the data was stored in a cloud based service protected by a login, that app's password was saved by default.

[-] ser@lemm.ee 21 points 3 months ago

This was 5 years ago at a usd200mil multinational...

The email system was pop3. There were no document backups. There was no collaboration tools. There was no IT security. You could basically copy company data out and no one would ever find out. The MS Office license was bought singly. Ahem!

[-] SwingingTheLamp@midwest.social 20 points 3 months ago

I started a job at a university department. A previous admin had a habit of re-purposing desktop machines as servers. There were at least a dozen of them. The authentication server for the whole department was on an old Dell desktop. All of the partitions were LVM volumes, and the volume group consisted of 3 physical volumes: The internal SATA drive, a bare SATA drive in an external USB cradle, and an external USB SSD.

This is why we drink.

load more comments (3 replies)
[-] Lag@lemmy.world 19 points 3 months ago
load more comments (1 replies)
[-] DJDarren@thelemmy.club 19 points 3 months ago

Probably not as bad as some of the other examples here, but the company I currently work for has its 10tb shared drives backing up to a server that’s right next to it in the same cabinet. Those two servers, plus all of the networking hardware and a variety of ancillary devices are all plugged in to one socket via a bunch of extension cords.

Yes, the boss has been told to get it sorted, but he’s the kind of older guy who doesn’t give a shit.

load more comments (3 replies)
[-] slazer2au@lemmy.world 19 points 3 months ago* (last edited 3 months ago)

This want their fault and I feel for them.

Working in telecommunications and we get a call from a customer that they are moving premises in 3 months time. They want us to check the place out of we can get a service in there. All goes well, time table for install goes out and we rock up the day after they get the keys, only to find the previous tenant took ALL the copper cables with them. Now when I say all, I mean ALL. Data, telephony, and power were stripped out all the way back to the dmarc point of the building.

They were fucking pissed. The lease for the existing place ran out about 3 weeks after the got the keys to the new place.

load more comments (1 replies)
[-] feef@lemmy.world 17 points 3 months ago

Current company (Remote Desktop inception): Linux host machine -> Remote Desktop to windows machine -> Remote Desktop to Linux machine

Bad frame rates, modifier keys hardly ever work, super annoying to code. Windows machine resets all settings and files (besides desktop and one specific folder) each day. Each day I have to install a language pack, change display options, keyboard layout etc.

[-] Treczoks@lemmy.world 17 points 3 months ago

An IBM PC portable. Yes, PC. 4.77MHz, 256k RAM, two floppy drives. Built-in a maybe 8" green CRT screen, and the keyboard could be used as cover for the screen and disk drives.

In theory, this thing was portable. If you were a body builder. The case was steel, and the whole beast was about 15 to 20 kilograms.

load more comments (5 replies)
[-] space_of_eights@lemmy.ml 15 points 3 months ago

I have worked as a lead developer for a major print shop with about 100 employees. The entire order workflow for all branches was shoehorned into one order management system that was initially hacked together for one or two users. It was built on a then already ancient OpenERP system and it had a PHP and smarty frontend for the actual order management. All was hosted on one old debian box which was a VM on a Windows server.

At some point in time, MT decided to slap a web shop onto this system, which was part of the main code base. User data were saved into the same database with plain text passwords. That was convenient for the support people: if somebody forgot their password, you could call support and they would read you your password over the phone.

Another thing that made my hair raise in fear, was that for every single order, any working file was retained indefinitely, even in the light of the then-looming GDPR laws. This amounted of terabytes of data, much of it very private.

I worked at the main branch. When a person walked in, there was a desktop computer at the counter. No password protection, an order management screen open by default. People could just walk in and start viewing orders at will. I am not sure whether they did, but we did push MT to at least have manadatory password protection on their PCs.

[-] berryjam@lemmy.world 13 points 3 months ago

Windows

*shudders and goes to take a bath*

load more comments
view more: next ›
this post was submitted on 19 Jul 2024
178 points (98.4% liked)

Asklemmy

43750 readers
1240 users here now

A loosely moderated place to ask open-ended questions

Search asklemmy 🔍

If your post meets the following criteria, it's welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

~Icon~ ~by~ ~@Double_A@discuss.tchncs.de~

founded 5 years ago
MODERATORS