Americas

  • United States

Asia

Lightning? That’s the least of their problems

opinion
Aug 27, 20143 mins
Cloud ComputingIT LeadershipNetwork Security

This consultant pilot fish is called in by a new client — a banquet hall — to troubleshoot the wireless network after a lighting storm.

“They had several wireless access points and two of them had stopped working,” says fish. “The company computer admin — his real job is a bean-counter — said to use an AP from one part of the business to get another part of the business back up and running. Done.

“They also had a Pogoplug network-attached storage device that was connected to the network, and the power was turned off to it in the storm. I got it back up and running, and all was good in their world.”

The admin also tells fish that guest users have access to the company’s wireless network. There’s no special guest network set up, so everyone is on the same network.

That doesn’t sound like a good idea to fish — the banquet hall is pretty solidly booked, which means every weekend it’s packed with event guests and during the week it’s full of business users at meetings or retreats. But fish has been hired to deal with the storm, not security.

Flash forward a month and a half: Fish is back to install more memory into the computers. While he’s there, someone mentions that since his last visit, users can’t access the Pogoplug from home any longer.

That’s the whole point of the device, which lets users get at their files through the cloud as well as on the LAN, so fish looks into the problem.

It turns out that device was set up to get its IP address from the router, so that IP address changed after it was turned off and on again. It’s easily fixed. That’s the good news.

The bad news? “I found out they were using this device as a storage location for files and orders with credit card numbers,” groans fish. “They were connecting to the device from their homes via a website. They didn’t have the local IP address or password to access the Pogoplug so that I could see how it was configured, but I was able to locate the IP address and guess the password and was able to access the unit.

“So the bottom line is that all those orders and credit cards are accessible from any computer on the LAN — including the guests that have access to the network.”

Give Sharky access to your story. Send me your true tale of IT life at sharky@computerworld.com. You’ll score a sharp Shark shirt if I use it. Add your comments below, and read some great old tales in the Sharkives.

Get your daily dose of out-takes from the IT Theater of the Absurd delivered directly to your Inbox. Subscribe now to the Daily Shark Newsletter.

sharky

Questions that Sharky gets a lot

Q: What's a pilot fish?

A: There are two answers to that question. One is the Mother Nature version: Pilot fish are small fish that swim just ahead of sharks. When the shark changes direction, so do the pilot fish. When you watch underwater video of it, it looks like the idea to change direction occurred simultaneously to shark and pilot fish.

Thing is, sharks go pretty much anywhere they want, eating pretty much whatever they want. They lunge and tear and snatch, but in so doing, leave plenty of smorgasbord for the nimble pilot fish.

The IT version: A pilot fish is someone who swims with the sharks of enterprise IT -- and lives to tell the tale. Just like in nature, a moment's inattention could end the pilot fish's career. That's life at the reef.

Q: Are all the Sharky stories true?

A: Yes, as best we can determine.

Q: Where do the Sharky tales come from?

A: From readers. Sharky just reads and rewrites and basks in the reflected glory of you, our readers. It is as that famous fish-friendly philosopher Spinoza said, "He that can carp in the most eloquent or acute manner at the weakness of the human mind is held by his fellows as almost divine."

Q: Do I have to write my story in Sharky-ese?

A: No. Not at all. Just be sure to give us details. What happened, to whom, what he said, what she said, how it all worked out. If Sharky likes your tale of perfidy, heroism or just plain weirdness at your IT shop, he will supply his particular brand of Shark snark.

Q: I've got a really funny story, but I could get fired if my old trout of a boss found out I told you. How confidential is what I send to Sharky?

A: We don't publish names: yours, your boss's, your trout's, your company's. We try to file off the serial numbers, though there's no absolute guarantee that someone who lived through the incident won't recognize himself. Our aim is to share the outrageous, knee-slapping, milk-squirting-out-your-nose funny tales that abound in the IT world, not to get you fired. That would not be funny.

Q: How do I get each new Shark Tank tale emailed to me?

Easy. Subscribe to the newsletter.

Q: Where are the Sharkives?

Tales of old can be found in Sharky's archive.