this post was submitted on 28 Sep 2024
641 points (96.2% liked)

Programmer Humor

19282 readers
700 users here now

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

founded 1 year ago
MODERATORS
641
Sometimes, it's backwards (sh.itjust.works)
submitted 1 day ago* (last edited 1 day ago) by [email protected] to c/[email protected]
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 9 points 1 day ago (6 children)

I think you probably don't realise you hate standards and certifications. No IT person wants yet another system generating more calls and complexity. but here is iso, or a cyber insurance policy, or NIST, or acsc asking minimums with checklists and a cyber review answering them with controls.

Crazy that there's so little understanding about why it's there, that you just think it's the "IT guy" wanting those.

[–] [email protected] 7 points 1 day ago (3 children)

So you don't trust me, but you trust McAfee to give it full control over the system. Yet my software doesn't work because something is blocked and nothing is showing up in the logs. But when we take off Mafee, it works. So clearly McAfee is not logging everything. And you trust Mcafee but not me? /s kinda.

[–] [email protected] 2 points 1 day ago* (last edited 1 day ago) (2 children)

No one on earth trusts McAfee, be it the abysmal man or abysmal AV suite.

If the EDR or AV software is causing issues with your code running, it's possibly an issue with the suite, but it's more likely an issue with your code not following common sense security requirements like code signing.

[–] [email protected] 4 points 1 day ago (1 children)

you don't code sign during development....

[–] [email protected] 2 points 19 hours ago

It's not common, but it should be.

Still, that was just one example. EDR reacting to your code is likely a sign of some other shortcut being taken during the development process. It might even be a reasonable one, but if so it needs to be discussed and accounted for with the IT security team.

load more comments (2 replies)