Announcement

Collapse
No announcement yet.

Fun at work....

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • #16
    I like to stalk just to stay in practice.
    Life is not measured by the number of breaths you take, but by the moments that take your breath away.
    "Hating America is something best left to Mobius. He is an expert Yank hater.
    He also hates Texans and Australians, he does diversify." ~ Braindead

    Comment


    • #17
      @ work today.
      Long time member @ Apolyton
      Civilization player since the dawn of time

      Comment


      • #18
        Suggestion 2:

        Start a rumon there's a mouse in the office.

        When a co-worker steps out of the room, use a dab of Elmer's glue to paste something small and furry (maybe even a toy mouse) to the bottom side of the handle of his phone receiver. Then scatter a few chocolate sprinkels around his phone.

        When he comes back into the office, dial his phone number--except for the last digit. When he comes back to his desk, he'll see the chocolate sprinkles. Before he gets a chance to get a good look at them, dial the last number.

        His phone rings. He grabs the receiver. Yiieee!

        Comment


        • #19
          check out this wild idea to do at work.

          work. Yes you could actually do what you were paid to do.

          I'm only kidding.

          Comment


          • #20
            tell people at work youre jewish and then proceed to inform them about simple things like kosher foods (Id love to eat a giraffe, its kosher!), channukah (the dreidel actually was actually used to cast tornadoes on the romans), and why you arent allowed at temple after "the incident".
            "I hope I get to punch you in the face one day" - MRT144, Imran Siddiqui
            'I'm fairly certain that a ban on me punching you in the face is not a "right" worth respecting." - loinburger

            Comment


            • #21
              We actually did these to each other at previous companies:

              - A guy had a 14" hard disk platter hanging as a decoration on his cubicle wall. We replaced the nail it was on with an ice pick pushed through the wall from the opposite side, so we could pull back on the ice pick and make the platter fall (clang!)

              - We filled a guy's office floor to ceiling with balloons. I manned the compressor, and we had four people tying them and throwing them in the office.

              - We took a ceiling tile out over a guy's head, shaved the edges down, and reinserted it with a couple of pins holding it up on one side, and two tie-wraps on the other side as hinges. Then, from the adjacent tile, we loaded it up with styrofoam peanuts, paper wads, etc. We the time was right, we pulled the pins remotely and dumped it on him.

              - Some friends of mine got the spare key to my car from my girlfriend. Every few weeks or so they would move my car, only slightly, one or two spaces, so it would not be obvious. I finally figured it out when I came out and I knew I had pulled through facing out of the space, but the car had been turned around facing into the space.

              - Some of the hardware guys got the schematic for one guy's car, and wired his horn up to his right turn signal. They first went out and disconnected his horn and left it off for about a week, so he would think it was disconnected and then shorted to the turn signal.

              Comment


              • #22
                MRT

                has had the most fun at work. First he was a porn star. After that career ended, he started having sex with his co-workers.
                “It is no use trying to 'see through' first principles. If you see through everything, then everything is transparent. But a wholly transparent world is an invisible world. To 'see through' all things is the same as not to see.”

                ― C.S. Lewis, The Abolition of Man

                Comment


                • #23
                  cronos, it's definitely possible.

                  One way to do it that comes to my mind on top of my head, pchang can correct me as he knows about this subject more than I do... basically you can just set the WAN port MAC address to anything you want if you have a router.
                  In da butt.
                  "Do not worry if others do not understand you. Instead worry if you do not understand others." - Confucius
                  THE UNDEFEATED SUPERCITIZEN w:4 t:2 l:1 (DON'T ASK!)
                  "God is dead" - Nietzsche. "Nietzsche is dead" - God.

                  Comment


                  • #24
                    Of course I don't know what happens, but I would assume some kind of network collision to happen if the same two MAC addresses are seen floating around in the same segment. I assume this would be a problem. That is, if you both are connected the same time.
                    In da butt.
                    "Do not worry if others do not understand you. Instead worry if you do not understand others." - Confucius
                    THE UNDEFEATED SUPERCITIZEN w:4 t:2 l:1 (DON'T ASK!)
                    "God is dead" - Nietzsche. "Nietzsche is dead" - God.

                    Comment


                    • #25
                      Re: MRT

                      Originally posted by pchang
                      has had the most fun at work. First he was a porn star. After that career ended, he started having sex with his co-workers.
                      and now im jew
                      "I hope I get to punch you in the face one day" - MRT144, Imran Siddiqui
                      'I'm fairly certain that a ban on me punching you in the face is not a "right" worth respecting." - loinburger

                      Comment


                      • #26
                        circumcision at your age is quite painful
                        “It is no use trying to 'see through' first principles. If you see through everything, then everything is transparent. But a wholly transparent world is an invisible world. To 'see through' all things is the same as not to see.”

                        ― C.S. Lewis, The Abolition of Man

                        Comment


                        • #27
                          MAC Address impersonation

                          Originally posted by Pekka
                          Of course I don't know what happens, but I would assume some kind of network collision to happen if the same two MAC addresses are seen floating around in the same segment. I assume this would be a problem. That is, if you both are connected the same time.
                          There is software now that will allow you to assign MAC addresses to your hardware. In effect, it lets you impersonate any MAC address you want. Therefore, using the MAC address permission list is not safe.

                          However, one would have to know which MAC addresses are allowed in the first place to impersonate the proper one. In addition, having two devices show up on the network with the same MAC address would cause arp poisoning which would definitely hose both machines in question and could potentially hose the entire network segment.
                          “It is no use trying to 'see through' first principles. If you see through everything, then everything is transparent. But a wholly transparent world is an invisible world. To 'see through' all things is the same as not to see.”

                          ― C.S. Lewis, The Abolition of Man

                          Comment


                          • #28
                            is the arp table where the MAC addresses are stored? And it assigns the IP addresses to MAC addresses? And result is 'poisoning'.. can it deal with .. so it's not stable enough to recover from this and just ban the address for a while from the table?

                            But at least it does not carry over segments, that is, a pretty good ID theft in the network would be to take your 'stolen address' to another segment and function there, should be no problem?

                            What kind of methods would one have to track down the 'stolen MAC address', if we assume they woudl only use open WLANs, or just steal the connection from wireless networks that are just too weakly encrypted? You'd clone your address with software naturally.

                            Say, you know the address you're cloning is also in laptop and uses WLANs frequently. So you're just another laptop.

                            Say you'd also use that laptop ONLY for that and keep it clean.

                            How woudl you track it down, if you knew the segment x had that address and it was legit, while the other one wasn't.
                            In da butt.
                            "Do not worry if others do not understand you. Instead worry if you do not understand others." - Confucius
                            THE UNDEFEATED SUPERCITIZEN w:4 t:2 l:1 (DON'T ASK!)
                            "God is dead" - Nietzsche. "Nietzsche is dead" - God.

                            Comment


                            • #29
                              This would be pretty close to anonymous surfing. Assuming you keep the laptop clean otherwise and do not disclose your identity, post in forums, usenet etc, encrypt everything with strong encryption and set traps for possible forensics, you'd be able to communiate pretty securely, assuming also the usage of mail drop (using same webmail account, everyone always saves a draft, drafts are the messages).

                              The point is, if someone would discover the webmail and hack it, or get the IP's of the people using it, they would have a difficult time tracking down the actual laptop accessing it and therefore connecting it to a real person. I mean, it might be possible to track down the locations the address was working in, with pretty good accuracy, maybe soem meters accuracy(?), but of course the user would change position and try not to use the same open or weakly encrypted wlan twice, or create a pattern where you could see the person lives near this area or that area.

                              This coudl be a very powerful way to steal identities.
                              In da butt.
                              "Do not worry if others do not understand you. Instead worry if you do not understand others." - Confucius
                              THE UNDEFEATED SUPERCITIZEN w:4 t:2 l:1 (DON'T ASK!)
                              "God is dead" - Nietzsche. "Nietzsche is dead" - God.

                              Comment


                              • #30
                                - Excessive amounts of pool, foosball, ping pong, and LAN gaming
                                - Company soccer fields and an organized league (we played games in the late mornings, typically) [Rolled my ankle during a soccer match and got workers' comp for it...]
                                - Company gym
                                - "Labfest", which was more appropriately "Free beer fest with live bands, human foosball table, and free BBQ" (The source control systems were disabled on this day to prevent drunken commits to the sourcecode...)
                                "The issue is there are still many people out there that use religion as a crutch for bigotry and hate. Like Ben."
                                Ben Kenobi: "That means I'm doing something right. "

                                Comment

                                Working...
                                X