And much more effective in a distributed company than a dunce cap

------------------------------------------------------
Roger D. Seielstad - MCSE MCT
Senior Systems Administrator
Peregrine Systems
Atlanta, GA
http://www.peregrine.com


> -----Original Message-----
> From: Mike Carlson [mailto:[EMAIL PROTECTED]]
> Sent: Friday, November 09, 2001 9:09 AM
> To: Exchange Discussions
> Subject: RE: Outlook blocked access to the following 
> potentially unsafe
> 
> 
> Conformity by humiliation. Works like a champ.
> 
> Mike
> 
> -----Original Message-----
> From: Roger Seielstad [mailto:[EMAIL PROTECTED]] 
> Sent: Friday, November 09, 2001 8:07 AM
> To: Exchange Discussions
> Subject: RE: Outlook blocked access to the following 
> potentially unsafe
> 
> 
> Someone else on this list used to post the peoples names on the main
> Intranet page. It only took one major outbreak to fix that behavior.
> 
> Roger
> ------------------------------------------------------
> Roger D. Seielstad - MCSE MCT
> Senior Systems Administrator
> Peregrine Systems
> Atlanta, GA
> http://www.peregrine.com
> 
> 
> > -----Original Message-----
> > From: Eric Cooper [mailto:[EMAIL PROTECTED]]
> > Sent: Thursday, November 08, 2001 7:12 PM
> > To: Exchange Discussions
> > Subject: Re: Outlook blocked access to the following
> > potentially unsafe
> > 
> > 
> > At my last job we proposed a security policy whereby any user
> > who executed a
> > virus and infected the system would have to wear a dunce cap 
> > and a T-Shirt
> > that says "I'm the idiot who opened the virus" for a week.  
> > It was almost
> > made policy.  Damn hippies shot it down...
> > 
> > ----- Original Message -----
> > From: "Mike Carlson" <[EMAIL PROTECTED]>
> > To: "Exchange Discussions" <[EMAIL PROTECTED]>
> > Sent: Thursday, November 08, 2001 4:00 PM
> > Subject: RE: Outlook blocked access to the following
> > potentially unsafe
> > 
> > 
> > Exactly why MS has to create patches like this particular one.
> > 
> > Morons.
> > 
> > What would be cool is if you could put a lock on their mail
> > box so that
> > when they open up Outlook there is an administrative message staring
> > them in the face. Before they could open any email they 
> would have to
> > click OK and then retype what the administrative message 
> was in a box
> > exactly as it was. If they don't get it right, they are 
> > prompted again.
> > If a new virus goes around the admin could put a lock on 
> all mailboxes
> > until they perform those steps.
> > 
> > Kind like yelling at your kids. You tell them something and 
> then you 
> > make them repeat it back to you so that you realize they heard what 
> > you said.
> > 
> > -----Original Message-----
> > From: Martin Blackstone [mailto:[EMAIL PROTECTED]]
> > Sent: Thursday, November 08, 2001 5:49 PM
> > To: Exchange Discussions
> > Subject: RE: Outlook blocked access to the following
> > potentially unsafe
> > 
> > 
> > Users will open anything regardless of what you say.
> > I remember ILOVEYOU, and a user. I had sent out emails all day long 
> > warning about this virus that had penetrated to a few 
> machines before 
> > we had the DAT file for it. Anyhow, after an email an hour 
> all day, I 
> > was talking to this guy about it at his desk. As I am talking, he
> > is looking
> > at mail and opens it right then! He had a laptop, and I ripped the
> > PCCard NIC out, but too late. He just stood there and stared 
> > at me, as I
> > turned and ran for my servers. Too late.
> > 
> > 
> > -----Original Message-----
> > From: [EMAIL PROTECTED]
> > [mailto:[EMAIL PROTECTED]] On Behalf Of 
> Mike Carlson
> > Sent: Thursday, November 08, 2001 3:45 PM
> > To: Exchange Discussions
> > Subject: RE: Outlook blocked access to the following
> > potentially unsafe
> > 
> > 
> > Yes you should and you do. Edit the registry.
> > 
> > No reason to blame MS for stupid people that open every 
> > "clickmetof*ckupyourcomputer.exe" they get in an email.
> > 
> > When are people going to take responsibility for stupid 
> stuff they do 
> > and their own incompetence.
> > 
> > If you don't know how to drive are you going to blame the 
> person that 
> > runs into you? If you don't know how to use a shotgun are going to 
> > blame the person who sold you the gun when you blow your arm off?
> > 
> > I am amazed all the time when we get new hires, that cant
> > barely survive
> > without a sign on their desk reminding them to inhale and exhale
> > otherwise they will die, and throw them in front of a 
> > computer and they
> > have no clue. We had to send a tech down to help a person log 
> > into their
> > computer. They didn't know how to press CTRL+ALT+DEL. The 
> keyboard had
> > CTL instead of CTRL on the key.
> > 
> > Or the other fabulous ones that reboot their computer and
> > call us saying
> > their hard drive crashed when all they did was leave a non-bootable
> > floppy disk in the drive.
> > 
> > People need to take responsibility and face up to the fact
> > that they are
> > computer illiterate or just plain dense when it comes to 
> some of this
> > stuff.
> > 
> > Because people think they are computer geniuses even though they 
> > couldn't tell the difference between \ and / companies like 
> Microsoft 
> > have to put in their application things like this patch.
> > 
> > My wife is a prime example. She will be the first to admint
> > she doesn't
> > know anything about computers ecept for the applications 
> that she uses
> > all the time. If I am logged into my computer and she needs 
> > it, she logs
> > into her own account because I have setup her account so 
> that she cant
> > do any damage to the computer.
> > 
> > Don't blame MS. They are just responding to all the crap they
> > got about
> > not being secure. If people wouldn't click on every stupid 
> theng they
> > get via email, MS would ahev NEVER released that patch.
> > 
> > There is no one to blame but morons.
> > 
> > Mike
> > 
> > -----Original Message-----
> > From: Wynkoop, John [mailto:[EMAIL PROTECTED]]
> > Sent: Thursday, November 08, 2001 2:11 PM
> > To: Exchange Discussions
> > Subject: RE: Outlook blocked access to the following
> > potentially unsafe
> > 
> > 
> > I should have the option to block attachments or not!
> > 
> > Explanation:
> > Some of us (those who work for universities with stupid 
> staff members 
> > and arrogant professors) don't have the option of blocking 
> attachments
> 
> > (Gosh forbid we infringe on anyone's "academic freedom").  That is 
> > unless we wish to endure a never ending reign of sh*t from above. 
> > Instead we have to work around the vunerabilities found in 
> things such
> 
> > as VBS, EXE, and COM files (which we have successfully done I might 
> > add).  We managed to succesfully ward off NIMDA, Code Red, 
> and a rash 
> > of other recent viruses without changing what users can and
> > can't do (see,
> > it can be done).  Now outlook just gives my users one more reason to
> > jump down my throat when something doesn't work.  Thanks MicroShaft.
> > 
> > John
> > 
> > -----Original Message-----
> > From: Martin Blackstone [mailto:[EMAIL PROTECTED]]
> > Sent: Thursday, November 08, 2001 2:45 PM
> > To: Exchange Discussions
> > Subject: RE: Outlook blocked access to the following
> > potentially unsafe
> > 
> > 
> > Even allowing your mail system to pass .EXE and .COM files is
> > a mistake.
> > You should thank MS for making OL block those types of 
> files since you
> > don't.
> > 
> > -----Original Message-----
> > From: [EMAIL PROTECTED]
> > [mailto:[EMAIL PROTECTED]] On Behalf Of Andy David
> > Sent: Thursday, November 08, 2001 11:41 AM
> > To: Exchange Discussions
> > Subject: RE: Outlook blocked access to the following
> > potentially unsafe
> > 
> > 
> > >>>>For such a typically minor patch?
> > Where did you get that idea?
> > 
> > The Patch didnt break Outlook, your lack of preparation did.
> > 
> > Over and Out.
> > 
> > -----Original Message-----
> > From: Shawn Connelly [mailto:[EMAIL PROTECTED]]
> > Sent: Thursday, November 08, 2001 2:30 PM
> > To: Exchange Discussions
> > Subject: RE: Outlook blocked access to the following
> > potentially unsafe
> > 
> > 
> > You know, it astounds me that so many IT people are blind to
> > Microsoft's
> > incompetence!
> > 
> > BTW Mike, your 'car head light' analogy is not even 
> relevant.  A more 
> > apt analogy would refer to the Ford Pinto's with the exploding gas 
> > tanks.  Sure the user could be mindful of driving only on 
> roads with 
> > no other vehicles, thereby preventing a back-end collision.  The
> > 'solution'
> > in service patch 2 could be likened to Microsoft removing 
> the gas tank
> > altogether.
> > 
> > First, I read about 70% of the material related to this 
> service patch.
> 
> > There are about 20 pages of material relating to this patch 
> and since 
> > I run a dept. with over 50 systems and 6 servers ON MY OWN 
> (no help, 
> > not even support contracts), I really don't have the time (nor is
> > it humanly
> > possible) to read every patch/update/security document produced by
> > Microsoft alone (to say nothing about the 50+ other products I look
> > after).  No, I'm not whining!!
> > 
> > Simply put, this patch broke Outlook!!  An email program 
> that cannot 
> > accept
> > .com and .exe's is damaged!   Yes, yes, I know there are 
> other methods
> > of
> > receiving files (such as zip'ed) but the point is that no 
> other email 
> > program such as Eudora, Groupwise, Netscape block these 
> attachments. 
> > All Microsoft had to do was to either disable the dangerous
> > capabilities of
> > .asp,.vbs, (et al) code OR entirely block access to this 
> code.  IT WAS
> > AS SIMPLE AS THAT!!
> > 
> > Geezz, what's with some of you in this (supposed to be?) friendly 
> > discussions group?
> > 
> > I sent a message asking about this (yes, I admit it was
> > confrontational)
> > and I read return responses basically calling me an idiot 
> > based on inane
> > assumptions!
> > 
> > Of course, I had to risk installing this patch because the 
> risk of an 
> > Outlook-based virus outbreak out weighted the potential 
> annoyance of 
> > breaking Outlook.  BTW, I have never experienced a virus 
> outbreak in 
> > the 6 years I've been with this company because of my pro-active 
> > stance on these issues.
> > 
> > Message to Lori:
> > "Project Plan and Test Plan Results"???  For such a typically minor 
> > patch? How many IT people do you have in your organization? 
> The last 
> > time I had the time to do anything like that was in 98/99 
> for Y2K. I'm
> 
> > beginning to feel very small; am I the only IT person in this 
> > discussion group with an IT budget less than my wage?
> > 
> > Message to Andy David:
> > See note about inane assumptions.
> > 
> > Over and out,
> > Shawn
> > 
> >  -----Original Message-----
> > From: Exchange Discussions digest [mailto:[EMAIL PROTECTED]]
> > Sent: November 6, 2001 1:00 AM
> > To: exchange digest recipients
> > Subject: exchange digest: November 05, 2001
> > 
> > Subject: RE: Outlook blocked access to the following
> > potentially unsafe
> > at tach ments
> > From: "Mike Carlson" <[EMAIL PROTECTED]>
> > Date: Mon, 5 Nov 2001 09:38:28 -0600
> > X-Message-Number: 38
> > 
> > It amazes me when people complain about this patch. First 
> developers 
> > wanted the ability to autmoate/script everything to 
> customize it for 
> > their environment. "Give us the tools! Give us the ability!" Well 
> > Microsoft did. Now that users and administrators are too 
> stupid, yes I
> 
> > mean stupid, to be mindful of attachments and security issues, they 
> > now blame Microsoft for releasing a buggy product. Its like 
> blaming a 
> > car company, when you get rear-ended, for your brake lights 
> being out.
> > 
> > Similarily, the current crap about IIS being insecure is the same 
> > situation. If the system administrators would apply patches 
> when they 
> > come out, and properly configure the machines, they would have no 
> > problems.
> > 
> > When a company like Microsoft has to write into their application a 
> > security process that the administrators should do themselves, you 
> > have no one to blame but moron users and incompetant administrators.
> > 
> > No one in our company had the ability, except admins, to open .exe, 
> > .vbs, wsh files from Outlook before they released the 
> patch. We have a
> 
> > policy that everything must be in .zip or other compressed archive 
> > format like .sit or .tar. This way we can limit the 
> vulnerabilites we 
> > have.
> > 
> > People want it easy to use and administer. With that comes 
> > responsibility. If you cant take responsibility, you do not deserve 
> > your job.
> > 
> > BTW: A company I do development for, fired 2 administrators
> > because they
> > got hacked by Code Red and Nimda. They were too stupid and 
> incompetent
> > to install patches that had been out for quite a long time.
> > 
> > So again, blame stupid users and lazy administrators, not Microsoft.
> > 
> > Also, if you blindly install patches and fixes without reading the 
> > documentation first and then testing the patches, your job 
> should be 
> > on shakey ground.
> > 
> > -----Original Message-----
> > From: Hunter, Lori [mailto:[EMAIL PROTECTED]]=20
> > Sent: Monday, November 05, 2001 8:50 AM
> > To: Exchange Discussions
> > Subject: RE: Outlook blocked access to the following
> > potentially unsafe
> > at tach ments
> > 
> > 
> > Sue Mosher and I (and so many many others) made it a 
> personal goal to 
> > speak ill of this patch whenever possible.  In fact, we 
> only refer to 
> > it as the Hell Patch.  Not sure who coined that one but it does fit.
> > 
> > So Shawn, can you show me your Project Plan and Test Plan 
> Results for 
> > the application of this patch in a production environment?  
> Or did you
> 
> > just blindly apply it and are now here to get your money back?
> > 
> > No soup for you.  NEXT!!
> > 
> > -----Original Message-----
> > From: Andy David [mailto:[EMAIL PROTECTED]]
> > Sent: Friday, November 02, 2001 8:16 PM
> > To: Exchange Discussions
> > Subject: RE: Outlook blocked access to the following
> > potentially unsafe
> > at tach ments
> > 
> > 
> > Ahhh, I love it..
> > If you had bothered to do even a little research before
> > applying the SP
> > you would have known this... But of course, it's Microsoft's fault.
> > 
> > 
> > 
> > 
> > _________________________________________________________________
> > List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
> > Archives:               http://www.swynk.com/sitesearch/search.asp
> > To unsubscribe:         mailto:[EMAIL PROTECTED]
> > Exchange List admin:    [EMAIL PROTECTED]
> > 
> > _________________________________________________________________
> > List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
> > Archives:               http://www.swynk.com/sitesearch/search.asp
> > To unsubscribe:         mailto:[EMAIL PROTECTED]
> > Exchange List admin:    [EMAIL PROTECTED]
> > 
> > 
> > _________________________________________________________________
> > List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
> > Archives:               http://www.swynk.com/sitesearch/search.asp
> > To unsubscribe:         mailto:[EMAIL PROTECTED]
> > Exchange List admin:    [EMAIL PROTECTED]
> > 
> > _________________________________________________________________
> > List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
> > Archives:               http://www.swynk.com/sitesearch/search.asp
> > To unsubscribe:         mailto:[EMAIL PROTECTED]
> > Exchange List admin:    [EMAIL PROTECTED]
> > 
> > _________________________________________________________________
> > List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
> > Archives:               http://www.swynk.com/sitesearch/search.asp
> > To unsubscribe:         mailto:[EMAIL PROTECTED]
> > Exchange List admin:    [EMAIL PROTECTED]
> > 
> > 
> > _________________________________________________________________
> > List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
> > Archives:               http://www.swynk.com/sitesearch/search.asp
> > To unsubscribe:         mailto:[EMAIL PROTECTED]
> > Exchange List admin:    [EMAIL PROTECTED]
> > 
> > _________________________________________________________________
> > List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
> > Archives:               http://www.swynk.com/sitesearch/search.asp
> > To unsubscribe:         mailto:[EMAIL PROTECTED]
> > Exchange List admin:    [EMAIL PROTECTED]
> > 
> > 
> > 
> > _________________________________________________________________
> > List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
> > Archives:               http://www.swynk.com/sitesearch/search.asp
> > To unsubscribe:         mailto:[EMAIL PROTECTED]
> > Exchange List admin:    [EMAIL PROTECTED]
> > 
> 
> _________________________________________________________________
> List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
> Archives:               http://www.swynk.com/sitesearch/search.asp
> To unsubscribe:         mailto:[EMAIL PROTECTED]
> Exchange List admin:    [EMAIL PROTECTED]
> 
> _________________________________________________________________
> List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
> Archives:               http://www.swynk.com/sitesearch/search.asp
> To unsubscribe:         mailto:[EMAIL PROTECTED]
> Exchange List admin:    [EMAIL PROTECTED]
> 

_________________________________________________________________
List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
Archives:               http://www.swynk.com/sitesearch/search.asp
To unsubscribe:         mailto:[EMAIL PROTECTED]
Exchange List admin:    [EMAIL PROTECTED]

Reply via email to