IWETHEY v. 0.3.0 | TODO
1,095 registered users | 1 active user | 0 LpH | Statistics
Login | Create New User
IWETHEY Banner

Welcome to IWETHEY!

New Just wondering how you would answer question #3
I'm applying for a job with the local county as a Technical Information Processing Specialist III. Part of the application is an "essay question" bit - and I'm hung on question #3. Rather than saying "Hey guys, do my app for me," I'd just like to see how you'd answer #3, hopefully that will jog something loose. I've included the other questions so you can see what they entail.

1. Please describe your level of competency in MS Office Suite and the extent to which you have
developed and applied office solutions using MS Office or similar software.
2. Please describe how your work experience demonstrates:
a. Your ability to multi-task; manage and prioritize multiple projects or tasks in the same timeframe.
b. Customer service orientation
c. Dealing effectively with difficult personalities and situations
d. Accuracy with details
e. Trouble shooting and solving multifaceted and specialized problems with applications
3. Other than the creation of computerized office solutions, please explain how you have taken initiative
and performed in a self-directed manner in your work experience.

Thanks!
InThane - Now running Ashton rev 2.0
New question number 3 depends on how bad you want the job
dont give a crap
3. Other than the creation of computerized office solutions, please explain how you have taken initiative
and performed in a self-directed manner in your work experience..
Answer
I have seen the excorcist 300 times and it keeps getting funnier every FUCKING TIME.
then spin your head in a circle.

want the Job
3. Other than the creation of computerized office solutions, please explain how you have taken initiative
and performed in a self-directed manner in your work experience.
Answer.
I spend a lot of time doing preventative maintenace and training of users as my goal is to have happy self directed users willing to come to me knowing their needs will be met in a timely and pleasant fashion.
(then wipe the brown off yer nose before it stains.)
good luck,
Thanks
TAM ARIS QUAM ARMIPOTENS
New I'd go with the second one
it seems that brown nosers get hired more likely than the first example. :)

But seriously, it is the brownnosers that get hired and get to keep their jobs. Look out, because if you have a few brown nosers in your team, one of them is going to get promoted to being your boss or part of the management.

I am free now, to choose my own destiny.
New #1 can be more appropriate, sometimes.
And I think I'd like to work for the boss that hired me after I answered that way...

Imric's Tips for Living
  • Paranoia Is a Survival Trait
  • Pessimists are never disappointed - but sometimes, if they are very lucky, they can be pleasantly surprised...
  • Even though everyone is out to get you, it doesn't matter unless you let them win.
New Sometimes, if you work for Tim Burton :)
It would be a good way to get into one of his movies. Like a Sequel to [link|http://www.bizrate.com/marketplace/product_info/details__cat_id--5103,prod_id--2081454,format--DVD.html|BeetleJuice]

I haven't done a headspin since my teenage years, I've forgotten how to do those, just like I forgot how to turn into the Incredible Hulk. I did it once, I swear! :) Nah just kidding.

I am free now, to choose my own destiny.
New Or as a friend of my Mater used to say
(when asked what job in the company, he was seeking)

Well, how about your job? I can do anything.

I think.. (?) he got a job that way. But ya gotta have cooled Psych 103 to play in that rarefied atmosphere where Truth occasionally rears its Pretty head...



Ashton
New I agree...
New Thanks Bill...
Gave me the momentum to fire off another resume...
InThane - Now running Ashton rev 2.0
New 3.
I figured out how to bypass the proxy server and get a direct Internet connection. I set up an X server and VNC on my workstation and hacked a system to circumvent the corporate firewall, so I can gain access to critical company data from home just like I was at work. I ran nmap against all our servers and found holes to exploit. I cracked our NT passwords because our admins are idiots and haven't applied the appropriate patches or thought much about NetBIOS security (I don't think they even understand NetBIOS. One of them told me NetBIOS doesn't run on token-ring).

In short, my motivation is such that I have totally compromised the security of our company without even being suspected or leaving much of a trace, at least, not one that can be followed by the ninnies we hired.

PS - thanks for the free unlimited Internet access I get with my direct RAS connection to my work machine. I love Windows!

-desitter
New Great answer!
That answer will get you put in charge of setting up connections (and generally bypassing security measures) for mid-to-upper level COs.

You wouldn't be allowed to improve security of the system, mind you...

Imric's Tips for Living
  • Paranoia Is a Survival Trait
  • Pessimists are never disappointed - but sometimes, if they are very lucky, they can be pleasantly surprised...
  • Even though everyone is out to get you, it doesn't matter unless you let them win.
Expand Edited by imric June 26, 2002, 02:02:43 PM EDT
New Welcome back!
Good answer!

I am free now, to choose my own destiny.
New On passwords
Any system can be compromised via passwords if you do not have good passwords.

My favoured route is to enforce longer passwords, but reduce the frequency of changing.

This way, it's easier to sell the idea that a good password matters to the users.

Short or non-complex passwords, frequently changed, are often very weak.

How did you go around the firewall? In my company, it's the only way in or out. I imagine that it's like that in lots of other places.


Peter
[link|http://www.debian.org|Shill For Hire]
[link|http://www.kuro5hin.org|There is no K5 Cabal]
[link|http://guildenstern.dyndns.org|Blog]
New Passwords
Make sure that it also remembers the last six passwords or more so they don't just repeat the same passwords over and over again.

Most common passwords at the lawfirm I worked at were:

password

passme

passment

Those were the passwords they used to reset the passwords for those who forgot their passwords, then they forgot how to change the password. If forced to change their password, they'd forget it and call the help desk anyway the next logon.

I am free now, to choose my own destiny.
New We have another way
of forcing new people to change their
passwords, before those loverly tools
did it.

Just change the password to something
like 'barry_is_my_god'. After typing this
once or twice, they get pissed of and
change it.
New I like!
I remember a net admin who once changed a password for an obnoxious user in his own section: he chose 'pteradactyl' :-).

Some years later when someone else bought us, I was amused to learn their helpdesk generally set password changes to 'changeme'.

Wade.

"Ah. One of the difficult questions."

New Nick Burns your company's computer guy
Ultimate revenge and a good way to get fired, one DSL helpdesk person set someone's User ID to "ILIKEMEN@**********.NET" when walking the person through the pick your own username and password screen. Needless to say that person was fired soon after. I guess they got tired of doing registrations and installs over the helpdesk? As far as we knew, the customer who got assigned the name was not gay. I'd imagine they weren't too happy with the name they got assigned either?

I am free now, to choose my own destiny.
New Easy
From the "Dynamic IP Hacks" howto:


It would be nice to be able to get access to my work machine (Sun) from
home, and vice versa, yet telnet is firewalled at work. Here's a way
around it.

For purposes of this explanation I'll give the method for gaining access
to my work machine from my home Linux machine, with a dial-up PPP
connection to my ISP and dynamic IP assignment.

From home, when I want access to my work machine, I dial-in and fire up
X, set "xhost +", determine my dynamic IP, and email my dynamic IP to my
work machine in a mail message with a particular format. On my work
machine I have a procmail recipe/script setup that parses the body of a
message whose subject matches a target, say "X-W". If the body of that
message meets certain requirements then it extracts the IP from the
message and spawns an xterm with the display directed to my home dynamic
IP like this:

xterm -display my.ip.i.sent:0.0 -e login

Voila! In about 30 secs to a minute, an xterm login shell appears on my
home machine! I haven't tried going the other direction yet because my
home machine isn't on full time, but using the other methods of
determining the dynamic IP from a remote machine it should work the same
way.


Now assuming you can sneak in a few VNC servers (corporate security is so braindead that this should be easy) you are on Windows and the games can begin.

You could slip in a UNIX box with a direct crossover connection and the appropriate routing to your Windows work box without anyone suspecting much. Just "accidentally" leave your laptop at work.

-desitter
New Blimey.
Your company leaves port 6000 open?

Wonders will never cease.


Peter
[link|http://www.debian.org|Shill For Hire]
[link|http://www.kuro5hin.org|There is no K5 Cabal]
[link|http://guildenstern.dyndns.org|Blog]
New Not Mine!
But you'd be surprised how porous corporate nets are.

-desitter
New Depends on the people running them
if they are just learning how to run a network or are former PHBs turned Network Administrators, then the security will be weak. Like the lawfirm I used to work for, someone ran a password cracker, and I noticed the database on a shared drive full of passwords, and apparently nobody seemed to care that it existed or that someone has a list of password from most of the user accounts, including administrators. They also didn't seem concerned with applying the latest patches and kept SP4 on the NT 4.0 Servers when SP6.1 was out. They used a Linux server for a firewall, but I think someone else set it up for them. I'd give out their address and domain name, but I don't want someone to hack them and then point a finger back at my post listing the address to go at.

I am free now, to choose my own destiny.
New Well if they don't...
It is amazing how many will instead leave outbound on 80 open. Given the knowledge at home of how to create a tunnel (not hard - just look in ssh's documentation) it is trivial to hijack that to send your X display home.

Cheers,
Ben
"... I couldn't see how anyone could be educated by this self-propagating system in which people pass exams, teach others to pass exams, but nobody knows anything."
--Richard Feynman
New Good to see you here...
How's things?
     Just wondering how you would answer question #3 - (inthane-chan) - (21)
         question number 3 depends on how bad you want the job - (boxley) - (6)
             I'd go with the second one - (orion) - (4)
                 #1 can be more appropriate, sometimes. - (imric) - (3)
                     Sometimes, if you work for Tim Burton :) - (orion)
                     Or as a friend of my Mater used to say - (Ashton)
                     I agree... -NT - (slugbug)
             Thanks Bill... - (inthane-chan)
         3. - (deSitter) - (13)
             Great answer! - (imric)
             Welcome back! - (orion)
             On passwords - (pwhysall) - (9)
                 Passwords - (orion)
                 We have another way - (broomberg) - (2)
                     I like! - (static) - (1)
                         Nick Burns your company's computer guy - (orion)
                 Easy - (deSitter) - (4)
                     Blimey. - (pwhysall) - (3)
                         Not Mine! - (deSitter) - (1)
                             Depends on the people running them - (orion)
                         Well if they don't... - (ben_tilly)
             Good to see you here... - (slugbug)

Sharp as a balloon.
70 ms