• 3 Posts
  • 502 Comments
Joined 2 years ago
cake
Cake day: June 10th, 2023

help-circle





  • So basically you have a tool which you use for certain tasks and when the tool broke you could not do all those tasks as easy as before. Well d’oh.

    Yeah, smartphones are ubiquitous now and required for many tasks so if you break your smart phone, doing these tasks gets harder, of course

    I don’t see that as a bad thing, these are tasks that smart phones have taken over and improved upon massively. That is a good thing ™

    There are lots of ways in which smart phones are bad for us, any of the items described here aren’t on that list, really.







  • I don’t blame a girl for doing a job that lands her food on the table. I blame the guy employing her because she’s the cheapest option

    Having said that, this design was so bad that she should not have been doing any of this. If you don’t know that SQL allows you to select multiple columns then by all means, do a tutorial, it’s not that hard.

    If you don’t even know what encryption is, that passwords need hashing and what not, then you should really question what you’re doing

    OPs question was about the worst code I’ve seen, that was the worst I’ve seen



  • A program that HR had built so that all employees could they their payment receipts online

    The username was the companies’ email address, the password was a government personal id code that you can lookup online, a don’t change, and you can’t update the password to something else.

    So I told the director of HR this was a bad idea. She told me I was overreacting until I showed her her own receipt, then she finally understood that this is a really fucking bad idea.

    Okay, so now she out me in charge of debugging that program.

    So I setup a meeting with the director of the company they hired, he came by with the developer: a 21 yo girl who I think hadn’t finished college yet. Great start! Apparently it was her idea to do the authentication like that so that explains a few things.

    So we dive in to the code.

    First of all, the “passwords” were stored in blank, no hashing, no encryption, nothing. That wasn’t the worst.

    For the authentication she made a single query to check if the user email existed. Of that was true, then step two was a second query to see if the password existed. If that were true, the email had been authenticated.

    So let’s say, hypothetically, that they had actual passwords that people could change… I could still login with the email from anyone, and then use MY OWN password to authenticate.

    This just blew my mind so hard that I don’t think I ever fully recovered, I still need treatment. The stupidity hurts


  • So-called “bossware” lets managers keep a close eye on employees’ activity, tracking everything from knowledge workers’ website visits to the gait and facial expressions of those involved in more physical activities.

    It would be so hard to not furiously masturbate to the camera just to shock the fuck out of those assholes.

    Anyways, this is sick behavior. If you have so little trust in your employees, than you are the problem, not them