Throwback Thursday: Choose a card, any card …

This conglomerate is structured as a number of smaller firms, with a giant central IT group plus particular person IT teams in a few of the firms, stories an IT pilot fish there.

“An IT staffer from one of many firms loaded a password cracker and proceeded to crack the Home windows NT servers,” fish says. “He despatched out emails bragging about how insecure NT was and giving the NT crew a tough time.”

Fish isn’t on the NT crew, however he and his safety co-workers resolve to strike again on behalf of their colleagues — they usually do it by the central IT audit group, to ensure it’s all above board.

First, they provide the audit folks with an inventory of greater than 100 Unix servers, and get them to choose a server at random. Amazingly, the audit group picks the one server on the record that belongs to the corporate the place the NT assault originated.

Fish and his cohorts proceed to crack the server vast open in entrance of the auditor.

“We then seemed shocked once we realized whose server it was,” says fish. “They have been warned for unauthorized hacking they usually needed to tighten their very own safety as properly.

“We additionally did a fast evaluate on our servers and tightened issues, however by doing this, it took the stress off us.

“To at the present time, the audit folks know we set them up with the ‘random’ selection of servers, however they haven’t labored out how we did it. And we’re not telling — simply in case we want them to pick one thing randomly once more.”

Choose a real story of IT life from your personal expertise and ship it to me at sharky@computerworld.com. You too can subscribe to the Every day Shark Publication and skim some nice previous tales within the Sharkives.

Leave a Reply

Your email address will not be published. Required fields are marked *