Forum Settings
       
1 2 Next »
Reply To Thread

Why do i have to pay for technical support?Follow

#27 Dec 19 2011 at 3:13 AM Rating: Excellent
***
3,272 posts
Dread Lörd Kaolian wrote:
#4 is really fun when its your cousin on his mom's work laptop...


Lol, we keep backups of all the stuff we pull off people's computers when we do rebuilds for those "just in case" moments when the customer is like "BUT BRO I STILL NEED ALL THAT ONE OBSCURE FILE I HID DEEP IN C:\PROGRAM FILES\JAVA\NOTPORN\THISISNTPORN\NOTPORN\STILLNOTPORN\BACKDOORSLUTSNINE.MPEG." I've probably got at least 5 gigs of **** backed up from rebuilds.

My worst so far was the dude in his early 70's whom is one of our contacts at the local telco. He throws jobs our way a lot when it comes to wiring and networking, well his laptop was acting slow.... Yup, loads of **** on it. So far I've been incredibly lucky to not come across any incredibly weird ****. God knows if I were to find CP on someone's laptop I would not want to deal with the legal headache that would follow.
#28 Dec 19 2011 at 9:00 PM Rating: Good
Last week a I spotted a virus in the Event Logs on one of the big servers (Exchange is pretty good about catching them) and sent out one of the guys for that site to poke the owner of the laptop and do a Malwarebytes scan on it.

Was sooo funny - apparently the guy was sweating bullets, because he thought we knew where he had acquired the virus. Guess he'd been going bad places on the work computer. (Was one of the dudes with full access past the firewall... lol medical people.)

Edited, Dec 19th 2011 10:01pm by catwho
#29 Dec 19 2011 at 11:53 PM Rating: Good
catwho wrote:
lol medical people
I'm not sure if I should take offense to this.
#30 Dec 20 2011 at 1:11 AM Rating: Excellent
****
6,119 posts
Daimakaicho, Eater of Souls wrote:
catwho wrote:
lol medical people
I'm not sure if I should take offense to this.

You definitely should.
#31 Dec 20 2011 at 1:45 AM Rating: Excellent
****
4,901 posts
Daimakaicho, Eater of Souls wrote:
catwho wrote:
lol medical people
I'm not sure if I should take offense to this.


No, you shouldn't. You can trust me, I'm not a doctor but I play one on TV.
____________________________
Love,
PunkFloyd
#32 Dec 20 2011 at 3:20 AM Rating: Good
Avatar
*****
13,240 posts
PunkFloyd, King of Bards wrote:
Daimakaicho, Eater of Souls wrote:
catwho wrote:
lol medical people
I'm not sure if I should take offense to this.


No, you shouldn't. You can trust me, I'm not a doctor but I play one on TV.


That's my line!
____________________________
Just as Planned.
#33 Dec 20 2011 at 3:38 AM Rating: Excellent
Avatar
******
29,919 posts
The local doctors office chain has computers in each one of their examination rooms, and network ports throughout the buildings. They have ports that appear to be tied to the same switch that is running their pharmacy computers sitting in lightly traveled hallways where someone could easily sit next to a wall with a laptop in hand and no one would think anything of it. They also have at least a few computers that appear to be configured to allow booting to USB and to CD. Don't ask why I know that. Anyways, I sent them a note letting them know about a couple of the issues a few years ago. they never did anything about it. Are there many people out there who could take advantage of that? no. but all it takes is one, and given what theya re running on the desktops and how obsolete some of their OS loads are, I don't have much hope that they have any blocking technologies in place at the network level.

The best part is they have all the computers in the rooms locked in these little acrylic cases that block the air vents, but leave the USB ports and the DVD drives and power buttons wide open.
____________________________
Arch Duke Kaolian Drachensborn, lvl 95 Ranger, Unrest Server
Tech support forum | FAQ (Support) | Mobile Zam: http://m.zam.com (Premium only)
Forum Rules
#34 Dec 20 2011 at 6:58 AM Rating: Decent
***
1,089 posts
Dread Lörd Kaolian wrote:
The local doctors office chain has computers in each one of their examination rooms, and network ports throughout the buildings. They have ports that appear to be tied to the same switch that is running their pharmacy computers sitting in lightly traveled hallways where someone could easily sit next to a wall with a laptop in hand and no one would think anything of it. They also have at least a few computers that appear to be configured to allow booting to USB and to CD. Don't ask why I know that. Anyways, I sent them a note letting them know about a couple of the issues a few years ago. they never did anything about it. Are there many people out there who could take advantage of that? no. but all it takes is one, and given what theya re running on the desktops and how obsolete some of their OS loads are, I don't have much hope that they have any blocking technologies in place at the network level.

The best part is they have all the computers in the rooms locked in these little acrylic cases that block the air vents, but leave the USB ports and the DVD drives and power buttons wide open.

I think we're just now educating the generation that will take network security seriously.
#35 Dec 20 2011 at 8:58 AM Rating: Good
Peimei wrote:
Dread Lörd Kaolian wrote:
The local doctors office chain has computers in each one of their examination rooms, and network ports throughout the buildings. They have ports that appear to be tied to the same switch that is running their pharmacy computers sitting in lightly traveled hallways where someone could easily sit next to a wall with a laptop in hand and no one would think anything of it. They also have at least a few computers that appear to be configured to allow booting to USB and to CD. Don't ask why I know that. Anyways, I sent them a note letting them know about a couple of the issues a few years ago. they never did anything about it. Are there many people out there who could take advantage of that? no. but all it takes is one, and given what theya re running on the desktops and how obsolete some of their OS loads are, I don't have much hope that they have any blocking technologies in place at the network level.

The best part is they have all the computers in the rooms locked in these little acrylic cases that block the air vents, but leave the USB ports and the DVD drives and power buttons wide open.

I think we're just now educating the generation that will take network security seriously.
Pretty much this. While I understand the risks and concerns associated with some of this stuff, it's hard enough as it is to get many doctors to use EMR (electronic medical records); many of them don't even know how to use a computer properly. So they just block out everything having to deal with computers and leave it to somebody else. It's not as big of an issue in a big university hospital like mine, but when you're in private practice and don't have an IT department to rely on, you need to have at least a working knowledge of this stuff or you're risking the theft of a lot of very confidential information.
#36 Dec 20 2011 at 11:44 AM Rating: Excellent
***
3,272 posts
Daimakaicho, Eater of Souls wrote:
Peimei wrote:
Dread Lörd Kaolian wrote:
The local doctors office chain has computers in each one of their examination rooms, and network ports throughout the buildings. They have ports that appear to be tied to the same switch that is running their pharmacy computers sitting in lightly traveled hallways where someone could easily sit next to a wall with a laptop in hand and no one would think anything of it. They also have at least a few computers that appear to be configured to allow booting to USB and to CD. Don't ask why I know that. Anyways, I sent them a note letting them know about a couple of the issues a few years ago. they never did anything about it. Are there many people out there who could take advantage of that? no. but all it takes is one, and given what theya re running on the desktops and how obsolete some of their OS loads are, I don't have much hope that they have any blocking technologies in place at the network level.

The best part is they have all the computers in the rooms locked in these little acrylic cases that block the air vents, but leave the USB ports and the DVD drives and power buttons wide open.

I think we're just now educating the generation that will take network security seriously.
Pretty much this. While I understand the risks and concerns associated with some of this stuff, it's hard enough as it is to get many doctors to use EMR (electronic medical records); many of them don't even know how to use a computer properly. So they just block out everything having to deal with computers and leave it to somebody else. It's not as big of an issue in a big university hospital like mine, but when you're in private practice and don't have an IT department to rely on, you need to have at least a working knowledge of this stuff or you're risking the theft of a lot of very confidential information.


I do a lot of work with a clinic in town that has four locations and the other day I was working with my PoC for the business on a machine that they needed looked at since it was acting up. I'll interject with some backstory here first. They have a 2k3sb server that runs like 25/30 cals for the clinic with their domain. All the big wigs have admin privs as well as some of the main receptionists (we didn't set this up, we are trying to remedy this fact that no one has those privs) and one other person who is like the clinic ***** and does all the grunt work involved, like when we set up thin clients in the exam rooms he was the one who had to put in the counter tops and did all the tie downs for the wiring. He also does some of the PT stuff they also offer to their patients. Basically this guy is one of those "I USED TO DO SOME FORM OF TECHNICAL WORK SO IM PRETTY SURE I KNOW EVERYTHING."

Back to the story at hand. When we put thin clients into the exam rooms I urged the head doctor to make sure that the providers and doctors always lock the thin clients or log off after every exam because of HIPAA. I set them up to autolock at like 1 minute just because I want them to be within all the regulations. All I had to do is mention that unlocking the thing is a minor annoyance compared to having to deal with a HIPAA violation, he agreed. Now, this previous mentioned computer is used soley by our "tech specialist" that works for the clinic. I remoted into the machine like I would any other day and I'm looking at the desktop and I see this icon I don't really recognize, its green and has a U on it. Derp, its ******* UTorrent. I unleashed a verbal **** storm onto my PoC (luckily I know her personally so its ok!) I searched and found some music that had been illegally downloaded and then I went over to the clinic personally to give them the whats up about how torrenting on a business computer is pretty much the worst idea ever.

Now, explaining how copyright laws work with regards to businesses was quite fun. I sat them down and looked straight into the doctors eyes and was like "So, here is how this will work. Your employee's are downloading music illegally on your business machines. First off they're using your equipment for personal stuff and technically its stealing from you and the company. Secondly, if they were to get caught guess what will happen. The lawyers don't care who is downloading the music, they care that they're doing it on the business computer so here is the fun part. They'll go after whomever has the deeper pockets. Your employee, or the business?" Right about here is where I got the reaction I was looking for. Pure and total horror knowing that a complete idiot of an employee could completely ***** the business into nothing. I mentioned that they should adopt a 0 tolerance policy towards downloading music and I just had to flat out tell them it doesn't matter how awesome the employee is, no employee is worth losing your business over, no matter how much you might like them.

The guy no longer works at the clinic. This is one of the times I'm so glad that a company listened to my wisdom when it comes to their well being and security. So many people are completely unaware of how easy it would be to have just one person ***** their entire operation up because of one minor little security flaw.

PS: I work as that small business IT solution for companies that cannot afford a full time IT staff for their business. I absolutely love doing it because of all the opportunity I get to spend time building relationships with my customers.
#37 Dec 20 2011 at 11:50 AM Rating: Good
ArexLovesPie wrote:
PS: I work as that small business IT solution for companies that cannot afford a full time IT staff for their business. I absolutely love doing it because of all the opportunity I get to spend time building relationships with my customers.


Yeah, same here. Okay, I don't love it because of fuzzy altruistic reasons. I love it because I learn something new every day, and my office is full of great people. The clients... eh, I could live without them, but I'm the remote sysadmin type here so I don't actually talk to them very much. Thank goodness.
#38 Dec 20 2011 at 2:18 PM Rating: Good
HIPAA is a huge buzzword for us. Just mention the possibility of violating it and everyone is on their toes and freaking out. It's a big deal and we have to go through a lot of effort to make sure we are protecting the information that needs to be protected. Like that torrenting situation you described though, it's probably a simple case of the person not realizing the consequences of their actions. If he had known the consequences, I would be willing to bet he'd be too scared to even dare.
#39 Dec 20 2011 at 2:24 PM Rating: Good
***
3,272 posts
Daimakaicho, Eater of Souls wrote:
HIPAA is a huge buzzword for us. Just mention the possibility of violating it and everyone is on their toes and freaking out. It's a big deal and we have to go through a lot of effort to make sure we are protecting the information that needs to be protected. Like that torrenting situation you described though, it's probably a simple case of the person not realizing the consequences of their actions. If he had known the consequences, I would be willing to bet he'd be too scared to even dare.


I'm sure he didn't know the consequences but given his general demeanor I doubt he cared. That being said, using hipaa has a buzzword does get its point across though.
1 2 Next »
Reply To Thread

Colors Smileys Quote OriginalQuote Checked Help

 

Recent Visitors: 260 All times are in CST
Anonymous Guests (260)