Originally posted by: IHateMyJob2004
Oh, keep in mind that I work at a defense contractor and internet security is a very serious issue. Not to mention we are not allowed to install any softwrae on PCs unless it is certified as safe. And even then, IT has to install it. They even track what you DL where I work!
2 weeks ago she disappeared and I found out she was fired. I just found out the details. This idiot installed a P2P program to download free music. She was using a defense contractor's T3 to illegally share music files! She risked a good paying engineering job for free music! And anyone familiar with P2P programs, you are connecting to places all over the place all of the time. Talk about a security risk.
The funniest (saddest I guess) thing is that she asked her boss if she could use him as a
Originally posted by: Tremulant
Like SuperSix said, why did she have admin rights? Even if they have to sign a paper, sit through a meeting and repeat an oath that says they can't install software, they will do it anyways if they have the chance.
That IT dept needs to stop trusting their users.
Originally posted by: SuperSix
Why don't the have that network locked down more? She installed an app? I can't install ANYTHING on my PC at work and we're just using regular windows security.
Of course whe was at fault, but that IT department needs to get that network tightened up!
Originally posted by: NutBucket
NICE! That's one thing I definitely stopped using when told to do so.
Originally posted by: IHateMyJob2004
Originally posted by: MrCodeDude
1. Was she hot?
2. Meh, she's retarded for installing a P2P program at work. I thought it might be for posting on a forum or something.
YES. Body was 10. Face was an 8.5. Honestly though, the body might be my first ever 11 rating.
Originally posted by: cjgallen
I was a defense contractor for a year. P2P was useless because of the proxy server. Not only would any P2P not work at all, the chain of command would hear about it being installed almost instantly.
Had a few people looking at porn though, that was a riot.
Originally posted by: rahvin
Originally posted by: Rogue
Exactly. I've found through trial and error that the harder you lock down a system, the harder people will try to break your systems to do what they want, even though what they want to do does little for them other than violate your policy.
The best deterrent I've found has been to simply let people know that you CAN see everything. When people realize exactly what you can see, word spreads fast and people keep eachother in check. They also function under the assumption that anything they do at any time can be traced to them and action can and will be taken. It's when they think you CAN'T see what they're doing and that you're not actually looking at it that you start to see problems creep in.
Exactly, rather than go on some power hungry trip it's much more effective to let them know that they abuse the policy and they will be in front of their boss explaining it. You don't need to lock the computers down, just punish people that abuse the policy.
I will conceed that there are a few working environments where a lockdown is needed but those fall almost exclusively to call center atmospheres where employees share computers and with the high turnover are essentially temporary. Attempting to lock down the computer of anyone that is a long term employee is just a false sense of security and nothing more than a power trip by IT.
Originally posted by: RedCOMET
Darwin award??Originally posted by: IHateMyJob2004
My company has been canning people over internet abuse and it's something people pretty much have gotten the message about. Even though it'sa company of 11,000.
Anyways, this new girl was warned about a month ago about internet usage and I guess her whole department had to sign a paper that stated they are aware of the rules.
Oh, keep in mind that I work at a defense contractor and internet security is a very serious issue. Not to mention we are not allowed to install any softwrae on PCs unless it is certified as safe. And even then, IT has to install it. They even track what you DL where I work!
2 weeks ago she disappeared and I found out she was fired. I just found out the details. This idiot installed a P2P program to download free music. She was using a defense contractor's T3 to illegally share music files! She risked a good paying engineering job for free music! And anyone familiar with P2P programs, you are connecting to places all over the place all of the time. Talk about a security risk.
The funniest (saddest I guess) thing is that she asked her boss if she could use him as a reference.
CLIFF NOTES:
1) Work at a Defense contractor
2) They are very anal about network security.
3) Girl warned about interent abuse and signs papers stating she knows the issues.
4) Month later, canned for illegally sharing music files, and she actually installed P2P software on her PC!
Originally posted by: everman
Why did the IT dept not have proper security policies in place to restrict her from installing it in the first place?
Originally posted by: Rogue
Why does everyone think that removing admin rights stops unwanted software usage. Lookup Portable Firefox or PuTTY or any number of other stand alone applications that require a minimal number of files and most times just include a single executable file. It takes a tremendous amount of planning and preparation to completely lock down a system and even then, there's always a hole or a gap that someone will exploit in the system. All I would have to do is setup an SSH tunnel on my home PC and tunnel into it over port 80 using PuTTY and there's almost nothing they could do to stop it short of some pricey hardware at the network edge to sniff each packet and kill the traffic.
Originally posted by: ryan256
Originally posted by: Rogue
Why does everyone think that removing admin rights stops unwanted software usage. Lookup Portable Firefox or PuTTY or any number of other stand alone applications that require a minimal number of files and most times just include a single executable file. It takes a tremendous amount of planning and preparation to completely lock down a system and even then, there's always a hole or a gap that someone will exploit in the system. All I would have to do is setup an SSH tunnel on my home PC and tunnel into it over port 80 using PuTTY and there's almost nothing they could do to stop it short of some pricey hardware at the network edge to sniff each packet and kill the traffic.
There's ways around this one as well.
I work at a college university and we have many computers on campus that the students use. We had problems for the longest time with students installing all types of programs, P2P software, and games that did not require administrative rights to run. However a nice solution was found using Domain Policy.
Please see this screen shot.
This little setting allows you to specify what .exes and .coms are allowed to run. You can specify it per user or per machine. If the .exe is not in this list, it won't run! Doesn't matter if you are an admin or not. In addition the secured account is campuswide. Trying to log into a machone in another lab will not remove the restrictions. This has also been very helpful in blocking spyware, adware, and some viruses because their .exes generate a permissions error and are forbidden to execute.
The only way around this is to run something that is entirely web based. But we have a fix for that one too 😉
Originally posted by: Rogue
I'm aware of that, however, you have to take virtually every service executable, every application executable, etc. into account for it to work and that can be a real bear to manage. Couple that with the fact that people WILL simply rename the application they want to run in lieu of a legitimate one they don't use and you've gotten around it again. Short of there being a corresponding MD5 checksum for each program listed in the "allowed applications" list, it can be gotten around again. I never said it couldn't be done, I more or less said it is very time intensive to setup and maintain from an administration standpoint.