I've been reading the Bastard lately, and it's striking just how similar the methods and practices are to the ones that I find myself carrying out in real life in the recent months as I've slid into the role of full-time systems administrator for a non-profit organization that just happens to have ridiculous amounts of computers and ridiculous numbers of users and customers.
No, I haven't triggered a Halon fire surpression system on anyone yet, but that's likely because we don't even HAVE a fire surpression system of any sort. There's one particular person that I'd LOVE to try it out on. And no, I haven't locked anyone in a tape safe... Because we don't HAVE a tape safe.
But I have been party to a number of social engineering plots - ranging from slowly dehumanizing someone until they crack and are removed, to manipulating things to operate in a way favorable to myself, to dealing with problem people with a few quick SQL commands, literally dropping them from existance as far as we, as an organization, are concerned. And that's not even the beginning, really.
I even have my own PFY...
Save me? Or is this the way things are supposed to be.
No, I haven't triggered a Halon fire surpression system on anyone yet, but that's likely because we don't even HAVE a fire surpression system of any sort. There's one particular person that I'd LOVE to try it out on. And no, I haven't locked anyone in a tape safe... Because we don't HAVE a tape safe.
But I have been party to a number of social engineering plots - ranging from slowly dehumanizing someone until they crack and are removed, to manipulating things to operate in a way favorable to myself, to dealing with problem people with a few quick SQL commands, literally dropping them from existance as far as we, as an organization, are concerned. And that's not even the beginning, really.
I even have my own PFY...
Save me? Or is this the way things are supposed to be.
