|
Today's challenge is generate anagrams[^] and was suggested by E Ramaswamy. Go forth and code!
I'm travelling for the next 3 weeks for some much needed R&R. Any suggestions on challenges much appreciated.
cheers
Chris Maunder
|
|
|
|
|
There was interest from a couple to extend the one that I posted last week. I was surprised that so few replied. What are your thoughts?
I do have some other ideas, I'll find some time this weekend to write them up for you.
|
|
|
|
|
As a side-thought about improving visibility for these challenges, have you thought of "pinning" the challenge at the top of each Q&A page for greater visibility? The previous suggestion was as a sidebar on various pages, maybe this is better as an interim solution... your thoughts?
|
|
|
|
|
We use Inno Setup[^] for all of our installers, and have for years. I estimate we have over a man-year of work in installers for our products, optional features, etc. Yesterday I discovered that the innosetup.com site is now blocked by our IS department, which uses McAfee Web Gateway to manage 'prohibited' sites. Today I received an email from one of the IS yabbos to the effect that Inno Setup was not on the approved list of applications. I was told to apply for approval, and then they would consider beginning the exception process for the web site.
What. The. F***.
My plans are to be the good little corporate drone and fill out whatever numb-nuts crap they ask, and then go right the f*** ahead and continue to use Inno Setup. It works, it's easy to use, it's for crap's sake FREE.
To paraphrase JSOP, they'll take my Inno Setup when they claw it from my cold, dead hard drive.
(*) Corporate Douche-baggery Of The Day
Software Zen: delete this;
|
|
|
|
|
If I would have to set a list of approved / allowed applications, InnoSetup would be rated much higher than any McAfee product. In fact, the latter would be only on the list when I'm requested to put it there.
|
|
|
|
|
Jochen Arndt wrote: In fact, the latter would be only on the list when I'm requested forced at gunpoint to put it there.
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
|
|
|
|
|
I was going to write that we don't have any guns here at work.
But then I remembered that there is a compressed air powered nail gun somewhere in the work shop.
|
|
|
|
|
Jochen Arndt wrote: a compressed air powered nail gun somewhere in the work shop.
From personal experience, NEVER let a drunk plumber in the vicinity of one of these.
veni bibi saltavi
|
|
|
|
|
Quote: NEVER let a drunk plumber in the vicinity of one of these.
From personal experience too, craftsmen playing with tools of dissimilar trades are dangerous to your health.
|
|
|
|
|
I think it may be the nail gun that's the problem here.
veni bibi saltavi
|
|
|
|
|
McAfee molests Collies[^].
I can't believe some of the crap they convince corporate IT departments to buy. For example, our hard drives are encrypted using a McAfee product. Guess what happens if you have a motherboard fail, and you need to retrieve the data from the hard drive. You can't decrypt it. The data is completely unrecoverable.
Software Zen: delete this;
|
|
|
|
|
So ... ransomware then?
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
|
|
|
|
|
Hmm. I never made that connection before.
(thinks quietly; just ignore the sound of gear teeth breaking off)
Nah. I don't think McAfee is competent to pull off any kind of extortion scheme. Besides, my wife and I are big fans of the old Perry Mason TV series[^], so I've learned how to counter every blackmail scheme known to man.
Software Zen: delete this;
|
|
|
|
|
Gary Wheeler wrote: I don't think McAfee is competent to pull off any kind of extortion scheme.
Hmmm. I'm pretty sure they are an extortion scheme: have you ever tried to remove their software once installed?
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
|
|
|
|
|
Yes. The uninstall procedure was as follows:
1. Boot from a thumb drive.
2. Security wipe the primary drive.
3. Re-install Windows.
4. Re-install apps.
5. Reload data.
Software Zen: delete this;
|
|
|
|
|
The official method is more fun: How To Uninstall McAfee Antivirus - YouTube[^] - probably NSFW, it starts with the "F" word ...
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
modified 3-Mar-17 10:54am.
|
|
|
|
|
That might get a slightly, teensy weensy bit NSFW. Just saying.
veni bibi saltavi
|
|
|
|
|
I'd forgotten that it starts with the "F" word ... edited.
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
|
|
|
|
|
... and there are quite a lot of girls who obviously didn't take their mam's advice to dress up warm. Or to dress at all for that matter.
veni bibi saltavi
|
|
|
|
|
Gary Wheeler wrote: I can't believe some of the crap they convince corporate IT departments to buy
How do you think Microsoft did so well? The office suite is some of the worst written software I have ever encountered, and yet.....
Cheers,
Mick
------------------------------------------------
It doesn't matter how often or hard you fall on your arse, eventually you'll roll over and land on your feet.
|
|
|
|
|
That sounds like a TPM-based encryption....
This should only be an issue if someone isn't backing up the TPM keys.
"There are three kinds of lies: lies, damned lies and statistics."
- Benjamin Disraeli
|
|
|
|
|
Let me put it this way. Every time we've needed to recover a hard drive, the attempt has failed. That's why my group has their own servers, running without the corporate encryption, and our working data is backed up to those servers nightly.
Software Zen: delete this;
|
|
|
|
|
Security isn't doing their job then. It might be a good thing to remind them that Availability IS a leg in the triad.
"There are three kinds of lies: lies, damned lies and statistics."
- Benjamin Disraeli
|
|
|
|
|
Take a look at:
https://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/24000/PD24871/en_US/de_710_detech_user_guide_en-us_Rev.B.pdf
|
|
|
|
|
Talk to your manager - corporate rules don't have to make sense, but you flaunt them at your own risk. Many companies will start disciplinary processes for using "unapproved" sites and / or apps on company equipment.
Just sayin', is all.
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
|
|
|
|