Company wide email last week: there is an emergency patch for some software you’ve never heard of. Please update manually NOW; if it’s not patched by Tuesday, your machine will forcibly reboot.

Me: o software management portal of my work machine, is this software even installed, that I might update it?

portal: it’s not installed, no.

[Tuesday comes]

Your machine is going down NOW in the middle of the workday because you FAILED TO INSTALL THE PATCH, SINNER.

reader, the patch management system appears to have forcibly installed the vulnerable software in order to patch it.

thank gods! that was a close one

@0xabad1dea stupid morons exist in every company in every department... 🤷
@0xabad1dea *begins to type angry email to desktop team*
@0xabad1dea I maintain that computers were a mistake and we should have stopped at the printing press
@infosec_j @0xabad1dea Be careful. Woodblock/offset plate is OK; but Gutenberg's fast, cheap, and out-of-control 'movable type' nonsense is just asking for a world of integrity and availability problems.
@0xabad1dea
🤣 Classic. But hey, at least your machine is safe again! (at least until the next emergency patch)
Agnieszka R. Turczyńska (@[email protected])

Content warning: Work related noise

GSV Sleeper Service
@0xabad1dea now they can tell management that they patched 107% of vulnerable computers.
@0xabad1dea that is the most US federal government thing ever to happen outside of the US federal government
@0xabad1dea I was gonna joke that clearly, the right thing to do would be to install the vulnerable version first. I didn't think anyone would... actually...