• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

So, a girl got fired at work two weeks ago

Page 2 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.
Originally posted by: IHateMyJob2004
Originally posted by: BD231
No issues on the reference if you ask me, her P2P issue has nothing to do with what she's capeable of in her job title.

That said, if the job was anything she cared about I doubt she'd of been doing something so stupid. If you care to keep your job *anywhere* you go, you go to work and *WORK*, setting a good example of yourself and kissing the ass of anyone who's in the position to screw with your future employment.

Doing anything personal at work is a risk IMO.

She's an idiot from what people have told me. And paragraph 2 seems to contradict paragraph 1.

But she was one of the hottest "engineers" I have ever seen in my life (I think she was a ME).

The majority of the hot females at my job are some of the developers. But atleast I get to work with them. There's a few architects and engineers that are good looking, but they're far and few between.
 
1. Was she hot?
2. Meh, she's retarded for installing a P2P program at work. I thought it might be for posting on a forum or something.
 
Originally posted by: MrCodeDude
1. Was she hot?
2. Meh, she's retarded for installing a P2P program at work. I thought it might be for posting on a forum or something.

YES. Body was 10. Face was an 8.5. Honestly though, the body might be my first ever 11 rating.
 
Why does everyone think that removing admin rights stops unwanted software usage. Lookup Portable Firefox or PuTTY or any number of other stand alone applications that require a minimal number of files and most times just include a single executable file. It takes a tremendous amount of planning and preparation to completely lock down a system and even then, there's always a hole or a gap that someone will exploit in the system. All I would have to do is setup an SSH tunnel on my home PC and tunnel into it over port 80 using PuTTY and there's almost nothing they could do to stop it short of some pricey hardware at the network edge to sniff each packet and kill the traffic.
 
Originally posted by: Rogue
Why does everyone think that removing admin rights stops unwanted software usage. Lookup Portable Firefox or PuTTY or any number of other stand alone applications that require a minimal number of files and most times just include a single executable file. It takes a tremendous amount of planning and preparation to completely lock down a system and even then, there's always a hole or a gap that someone will exploit in the system. All I would have to do is setup an SSH tunnel on my home PC and tunnel into it over port 80 using PuTTY and there's almost nothing they could do to stop it short of some pricey hardware at the network edge to sniff each packet and kill the traffic.

Or they can just take the easy route and fire you.
 
Contradict how exactly?

If she already signed a contract about an internet usage issue and proceeded to install a P2P program, either a monkey is smart enough to fill her/your job title or she just didn't give a sh*t.

For your sake I'm gonna say she just didn't care. It's not funny, it's just *typical*. She was probably bored out of her mind!!!!
 
Originally posted by: BD231
Contradict how exactly?

If she already signed a contract about an internet usage issue and proceeded to install a P2P program, either a monkey is smart enough to fill her/your job title or she just didn't give a sh*t.

For your sake I'm gonna say she just didn't care. It's not funny, it's just *typical*. She was probably bored out of her mind!!!!

I forgot to mention in the OP, but she was married about one month ago .. . to everyones amazement. We never noticed a ring. Then canned shortly after. I'm bored out of my mind at times. I take a 15 minute dump to pass the time though. Can't track my inernet usage that way 😉
 
Originally posted by: KLin
Originally posted by: Rogue
Why does everyone think that removing admin rights stops unwanted software usage. Lookup Portable Firefox or PuTTY or any number of other stand alone applications that require a minimal number of files and most times just include a single executable file. It takes a tremendous amount of planning and preparation to completely lock down a system and even then, there's always a hole or a gap that someone will exploit in the system. All I would have to do is setup an SSH tunnel on my home PC and tunnel into it over port 80 using PuTTY and there's almost nothing they could do to stop it short of some pricey hardware at the network edge to sniff each packet and kill the traffic.

Or they can just take the easy route and fire you.

Provided they can catch it in the first place. Does your place of work disable CD-ROM drives? USB ports? Writing files to your hard drive or network share?

By the way, I work in network security for DoD, so I've seen just about all of it at one time or another. My previous job required me to keep Windows 95/98 secure, no small feat and damn near impossible. I know what I'm talking about here, trust me.
 
Originally posted by: Rogue
Originally posted by: KLin
Originally posted by: Rogue
Why does everyone think that removing admin rights stops unwanted software usage. Lookup Portable Firefox or PuTTY or any number of other stand alone applications that require a minimal number of files and most times just include a single executable file. It takes a tremendous amount of planning and preparation to completely lock down a system and even then, there's always a hole or a gap that someone will exploit in the system. All I would have to do is setup an SSH tunnel on my home PC and tunnel into it over port 80 using PuTTY and there's almost nothing they could do to stop it short of some pricey hardware at the network edge to sniff each packet and kill the traffic.

Or they can just take the easy route and fire you.

Provided they can catch it in the first place. Does your place of work disable CD-ROM drives? USB ports? Writing files to your hard drive or network share?

By the way, I work in network security for DoD, so I've seen just about all of it at one time or another. My previous job required me to keep Windows 95/98 secure, no small feat and damn near impossible. I know what I'm talking about here, trust me.


Nah, nobody can really do anything with our data unless they want to improve their tomato product recipes. 😛
 
Originally posted by: jiggahertz
You work for a defense contractor and have "Hillary 2008" in your sig?

Hillary 2008 is a joke. And the local base might close thanks to Mr. Bush! It's the largest proposed closure that the BRAC commision suggested.

And I don't hate republicans, it's just that most of them are incapable of logical thought.
 
sorta like when in the depression and the empire state building was going up. hundreds unemployed workers were in line outside waiting for a worker to fall to his death to get his job....

somebody said "thank you, you dumb bit*tch, i got your job now"
 
Same at my moms law firm.

She and all of her coworkers were fairly warned that the company would be hiring an outside group to analyze network activity.
And if you want to justify billing clients a couple hundred dollars an hour you damn well better be working for it.

Sure enough, after about one month they let a butt-load of secrataries, paralegals and even attorneys off the payroll. All of them were too busy playing flash games and searching for friends to IM.
Of course, the attorneys got nice severence package and hook-ups in other law firms, but the point was made.
 
Originally posted by: Tremulant
Just because she might have been responsible for national security doesn't mean she knew what she was doing on her computer. And according to the OP, she couldn't be trusted.

And so the blanket policy of not trusting anyone by IT idiots who are on a power trip continues. Sensible companies enact usuage policies then allow the normal chain of command to handle abuse of those guidelines. Power hungry IT idiots treat everyone like a criminal. Not only does it give you that sense of power it also gives you that false sense of control that others have pointed out because in reality you don't really have the control you think you do.
 
Originally posted by: rahvin
Originally posted by: Tremulant
Just because she might have been responsible for national security doesn't mean she knew what she was doing on her computer. And according to the OP, she couldn't be trusted.

And so the blanket policy of not trusting anyone by IT idiots who are on a power trip continues. Sensible companies enact usuage policies then allow the normal chain of command to handle abuse of those guidelines. Power hungry IT idiots treat everyone like a criminal. Not only does it give you that sense of power it also gives you that false sense of control that others have pointed out because in reality you don't really have the control you think you do.

they are IT power hungry idiots because their bosses boss has given them a task to do. if they dont do it they get fired.

im lucky, my company (about 1000 people) and we dont give a rats ass what people do on the web. we have other and more important things to do than to be the managers lacky and spy on them.
 
Originally posted by: rahvin
Originally posted by: Tremulant
Just because she might have been responsible for national security doesn't mean she knew what she was doing on her computer. And according to the OP, she couldn't be trusted.

And so the blanket policy of not trusting anyone by IT idiots who are on a power trip continues. Sensible companies enact usuage policies then allow the normal chain of command to handle abuse of those guidelines. Power hungry IT idiots treat everyone like a criminal. Not only does it give you that sense of power it also gives you that false sense of control that others have pointed out because in reality you don't really have the control you think you do.

Exactly. I've found through trial and error that the harder you lock down a system, the harder people will try to break your systems to do what they want, even though what they want to do does little for them other than violate your policy.

The best deterrent I've found has been to simply let people know that you CAN see everything. When people realize exactly what you can see, word spreads fast and people keep eachother in check. They also function under the assumption that anything they do at any time can be traced to them and action can and will be taken. It's when they think you CAN'T see what they're doing and that you're not actually looking at it that you start to see problems creep in.
 
Originally posted by: Rogue
Originally posted by: rahvin
Originally posted by: Tremulant
Just because she might have been responsible for national security doesn't mean she knew what she was doing on her computer. And according to the OP, she couldn't be trusted.

And so the blanket policy of not trusting anyone by IT idiots who are on a power trip continues. Sensible companies enact usuage policies then allow the normal chain of command to handle abuse of those guidelines. Power hungry IT idiots treat everyone like a criminal. Not only does it give you that sense of power it also gives you that false sense of control that others have pointed out because in reality you don't really have the control you think you do.

Exactly. I've found through trial and error that the harder you lock down a system, the harder people will try to break your systems to do what they want, even though what they want to do does little for them other than violate your policy.

The best deterrent I've found has been to simply let people know that you CAN see everything. When people realize exactly what you can see, word spreads fast and people keep eachother in check. They also function under the assumption that anything they do at any time can be traced to them and action can and will be taken. It's when they think you CAN'T see what they're doing and that you're not actually looking at it that you start to see problems creep in.

Proxy > *.*
 
Originally posted by: Rogue
Exactly. I've found through trial and error that the harder you lock down a system, the harder people will try to break your systems to do what they want, even though what they want to do does little for them other than violate your policy.

The best deterrent I've found has been to simply let people know that you CAN see everything. When people realize exactly what you can see, word spreads fast and people keep eachother in check. They also function under the assumption that anything they do at any time can be traced to them and action can and will be taken. It's when they think you CAN'T see what they're doing and that you're not actually looking at it that you start to see problems creep in.

Exactly, rather than go on some power hungry trip it's much more effective to let them know that they abuse the policy and they will be in front of their boss explaining it. You don't need to lock the computers down, just punish people that abuse the policy.

I will conceed that there are a few working environments where a lockdown is needed but those fall almost exclusively to call center atmospheres where employees share computers and with the high turnover are essentially temporary. Attempting to lock down the computer of anyone that is a long term employee is just a false sense of security and nothing more than a power trip by IT.
 
What I find wierd is that the ports for the respective P2P weren't blocked or filtered at the firewall level, and she was actually able to make ingoing and outgoing connections on a defense contractor's line.
 
I was a defense contractor for a year. P2P was useless because of the proxy server. Not only would any P2P not work at all, the chain of command would hear about it being installed almost instantly.

Had a few people looking at porn though, that was a riot.
 
Originally posted by: cjgallen
I was a defense contractor for a year. P2P was useless because of the proxy server. Not only would any P2P not work at all, the chain of command would hear about it being installed almost instantly.

Had a few people looking at porn though, that was a riot.

don't ask, don't tell
 
Back
Top