Meh, most of those workarounds won't, in any workplace with competent security policies and practices.
Let's see... Online emailing services - BLOCKED.
Unauthorised software sites - BLOCKED. Unauthorised programs on USB sticks - BLOCKED. USB storage devices in general - DISABLED. (Non-storage devices still work.)
Proxy sites - BLOCKED.
Company laptops attempting an internet connection to anything except the corporate VPN tunnel: LOCKED DOWN. or Uses copy of latest version of corporate blacklist: SITES BLOCKED.
Putting corporate documents on third-party servers: BANNED VIA POLICY, plus the sites themselves are BLOCKED, plus any resident third-party program which handles the interface is BANNED and AUTO-DELETED.
Encryption settings in corporate email: LOCKED DOWN. Encryptable IM software: BANNED and AUTO-DELETED.
Auto-forwarding all corporate email to an external account: BANNED, and email rules which incorporate it are AUTO-DELETED.
Reading webmail on a Blackberry: OK, as long as it's a corporate Blackberry where the automatic and ultra-paranoid virus scanners are LOCKED DOWN and the device is automatically given a thorough checkup and cleaning whenever it's plugged into the corporate network. Note also that it will only be configured to access the corporate webmail and users will not have the access to add personal accounts.
Surfing/slacking at work: All well and good, except that every URL and every click you make is recorded by the corporate proxies and monitoring software. If your boss wants a list of every site you visited and when, one call to IT is all it takes.
Summary: This is a lame list. Any place with an IT department worth its salt will already be way, waaaay ahead of the game with these. Yeesh, it didn't even mention using IP addresses instead of DNS names (BLOCKED!) or tunnelling to an external source over port 53 (monitor tripping!). And some of the activities it suggests (large file transfers, YouTube) are going to be picked up by the bandwidth monitors anyway, regardless of what convolutions the path to get them takes.
but for corporations with less-than-stellar security, this will be a nightmare. i work where different departments will have their own IT groups, and each group manages things differently. the lack of uniform security will cause a headache in any group, merely because the IT gods at the university will scream, holler, blame every IT group under them, and generally cause our lives hell as they audit each system.
Do you block VBA access in microsoft office related products (and do you block wsh script files ect.)
I've always found even in the places I've worked with strong policies there is always someone with a word document that when you open it it gives you more rights/alows the install of programs/does something else you're not supposed to do.
This is all well and good, but not every IT department has the tools at it's disposal to get these things done. At my last job, all it took was one person with ties to the CEO to complain, and next thing you know, I'm being called in on Sunday to install DVD software on someone's laptop while he stands over me, smirking, knowing that I'm his bitch now.
Mmmm. This is a good list, and from a reputable source. I will have to take pains to ... selectively provide this information to some people.
I can already smell the evolutionary processes at work ...
*smiles* One techie's nightmare is another techie's evolutionary chainsaw. It all depends on the careful and well-measured deployment of the information.
this will only cause mighty headaches for those poor saps working with poor 'net security...but there WILL be a large amount of fallout if people take this seriously. as mentioned to your friend taleya up there, i can see the letters to the editor now.
if it successfully weeds out more douchenozzles who don't really belong in their positions, so be it. less work for me in the long run.
well...i CAN say that with the amount of idiots users i see on the daily, it's really not surprising how many people claim innocence when the problem can easily be traced back to them.
So your mom doesn't want you to stay out late with my friends on school nights - she says something about education being important. How lame! Here are most-requested tips for getting around your parents' silly rules!
1. How to play in traffic
2. How to sneak home at 3 a.m. without being caught
3. How to hide the smell of pot
4. How to alter your report card
5. How to hide your Asian teen gangbang porn
6. How to hide the evidence of a wild party
7. How to pass off a hangover as the flu
8. How to meet up with strangers from the internet
9. How to get bailed out of jail without admitting what you actually did
The Risk: losing your job when your boss/company/etc find out that you've been circumventing security measures and making the company's proprietary information vulnerable and potentially public.
The Lifehacker (http://lifehacker.com/software/top/10-things-your-it-department-wont-tell-you-284192.php) comment thread this spawned is full of anger and great commentary by you types. :)
no subject
Date: 2007-08-01 03:01 pm (UTC)no subject
Date: 2007-08-01 03:15 pm (UTC)(no subject)
From:(no subject)
From:no subject
Date: 2007-08-01 03:19 pm (UTC)-Az
no subject
Date: 2007-08-01 03:21 pm (UTC)no subject
Date: 2007-08-01 03:23 pm (UTC)"DOING THIS SHIT WILL GET YOUR ARSE FIRED"
Surprisingly, we are employed to work. Mindboggling I know, but it's true...
no subject
Date: 2007-08-01 03:25 pm (UTC)i can see the complaint letters now:
"Dear Wall Street Journal,
YOU GOT MY ASS FIRED I HATE YOU DIE IN A FIRE!!1
Kthxbai."
(no subject)
From:(no subject)
From:(no subject)
From:(no subject)
From:(no subject)
From:(no subject)
From:(no subject)
From:(no subject)
From:(no subject)
From:(no subject)
From:(no subject)
From:(no subject)
From:no subject
Date: 2007-08-01 03:29 pm (UTC)no subject
Date: 2007-08-01 03:39 pm (UTC)no subject
Date: 2007-08-01 03:34 pm (UTC)no subject
Date: 2007-08-01 03:38 pm (UTC)sidenote...icon love. :)
no subject
Date: 2007-08-01 03:35 pm (UTC)Let's see...
Online emailing services - BLOCKED.
Unauthorised software sites - BLOCKED.
Unauthorised programs on USB sticks - BLOCKED.
USB storage devices in general - DISABLED. (Non-storage devices still work.)
Proxy sites - BLOCKED.
Company laptops attempting an internet connection to anything except the corporate VPN tunnel: LOCKED DOWN.
or
Uses copy of latest version of corporate blacklist: SITES BLOCKED.
Putting corporate documents on third-party servers: BANNED VIA POLICY, plus the sites themselves are BLOCKED, plus any resident third-party program which handles the interface is BANNED and AUTO-DELETED.
Encryption settings in corporate email: LOCKED DOWN.
Encryptable IM software: BANNED and AUTO-DELETED.
Auto-forwarding all corporate email to an external account: BANNED, and email rules which incorporate it are AUTO-DELETED.
Reading webmail on a Blackberry: OK, as long as it's a corporate Blackberry where the automatic and ultra-paranoid virus scanners are LOCKED DOWN and the device is automatically given a thorough checkup and cleaning whenever it's plugged into the corporate network. Note also that it will only be configured to access the corporate webmail and users will not have the access to add personal accounts.
Surfing/slacking at work: All well and good, except that every URL and every click you make is recorded by the corporate proxies and monitoring software. If your boss wants a list of every site you visited and when, one call to IT is all it takes.
Summary: This is a lame list. Any place with an IT department worth its salt will already be way, waaaay ahead of the game with these. Yeesh, it didn't even mention using IP addresses instead of DNS names (BLOCKED!) or tunnelling to an external source over port 53 (monitor tripping!). And some of the activities it suggests (large file transfers, YouTube) are going to be picked up by the bandwidth monitors anyway, regardless of what convolutions the path to get them takes.
no subject
Date: 2007-08-01 03:38 pm (UTC)Out of Curiosity
Date: 2007-08-01 05:08 pm (UTC)I've always found even in the places I've worked with strong policies there is always someone with a word document that when you open it it gives you more rights/alows the install of programs/does something else you're not supposed to do.
Re: Out of Curiosity
From:Re: Out of Curiosity
From:Re: Out of Curiosity
From:no subject
Date: 2007-08-01 10:28 pm (UTC)no subject
Date: 2007-08-01 03:53 pm (UTC)I can already smell the evolutionary processes at work ...
*smiles* One techie's nightmare is another techie's evolutionary chainsaw. It all depends on the careful and well-measured deployment of the information.
in an attempt to avoid airing dirty laundry better left buried
Date: 2007-08-01 04:06 pm (UTC)if it successfully weeds out more douchenozzles who don't really belong in their positions, so be it. less work for me in the long run.
no subject
Date: 2007-08-01 04:07 pm (UTC)People must be retarded if they think using "You send it" disguises the fact they uploaded, or downloaded, 2Gb in one session.
It never ceases to amaze me how people can claim complete disbelief that someone (or something) magically used a ton of data/bandwidth.
no subject
Date: 2007-08-01 04:09 pm (UTC)(no subject)
From:(no subject)
From:(no subject)
From:(no subject)
From:no subject
Date: 2007-08-01 04:41 pm (UTC)</irrational annoyance>
no subject
Date: 2007-08-01 04:44 pm (UTC)IT is just like your mom!
Date: 2007-08-01 04:51 pm (UTC)1. How to play in traffic
2. How to sneak home at 3 a.m. without being caught
3. How to hide the smell of pot
4. How to alter your report card
5. How to hide your Asian teen gangbang porn
6. How to hide the evidence of a wild party
7. How to pass off a hangover as the flu
8. How to meet up with strangers from the internet
9. How to get bailed out of jail without admitting what you actually did
10. How to get a quickie abortion
Re: IT is just like your mom!
Date: 2007-08-01 10:30 pm (UTC)no subject
Date: 2007-08-01 06:57 pm (UTC)The Risk: losing your job when your boss/company/etc find out that you've been circumventing security measures and making the company's proprietary information vulnerable and potentially public.
no subject
Date: 2007-08-01 07:24 pm (UTC)A logo that says Verisign proves the identity of the site? When did that start happening?
https secures the files you upload from the bad guys running the uploading service?
no subject
Date: 2007-08-01 07:38 pm (UTC)no subject
Date: 2007-08-01 07:39 pm (UTC)no subject
Date: 2007-08-01 08:05 pm (UTC)no subject
Date: 2007-08-01 11:37 pm (UTC)I can just see what'll happen back at my previous position when that does the rounds via intranet email/netchat.
*wince*
ok, time for my brain-bleach.
no subject
Date: 2007-08-02 12:52 pm (UTC)