Since you're reading this chances are that you are either in IT, wanna be in IT or you think this is some motivation "You Can Do It!" kinda post. Weird starting a blog out about telling folks how to work around our incredibility well thought out information technology policies. This is certainly not a Eric Snowden type of outing but really more of how we as the IT Crowd have to work with other IT departments that, hey let's face it man; are just not as good as us right?! Can I get a witness up in here!!!
We've all made silly IT policies that at the time really seemed like a great idea...you know like password types so complicated that they had to be wrote down?? Heck at my first crack at LAN Administration way back in the Johnson Administration, I required; Unknown letter combo, numbers, mixed case, special character, map to hidden Amber Room and you best possible guess to the Riemann Hypothesis. Oh it was secure for sure...of course it was over a proprietary protocol network type called ScaNET...so that was a resume generating event.
Anyway...
How many times as an IT geek do you just get fire ant angry when a company blocks PINGs!!??! Or turning off rights inheritance; heck I'm still seeing a therapist over that event. Well, that and troubleshooting a system trust issue with over 10K user accounts...thru NAT...internal NAT!!...Yeah I know right!! oh the horror!!! Eli Roth's next movie...
Here's a few tricks I've picked up along the way to help...solve problems...
Workaround 00