Because every workaround has a workaround...


This contract IT pilot fish has mentored a whole series of fellow employees in Unix over the years, teaching them tricks for working around such problems as forgetting the root password.

"However, I always followed that up with a warning that if they used the tricks for anything naughty, I would hunt them down and expose what they'd done," says fish.

"Nobody dared to try anything like that until a couple years ago.

"Somebody I had taught Unix to made a mistake and took a live system out. He then panicked and, rather than admit it, he tried to hide what he had done and blame somebody else.

"I was asked to investigate. I could see somebody had tried to mask what they had done and even modified the system files to hide their efforts.

"But when I trained people, the one thing I kept back was that the way around I teach them also has its own logs -- which meant I was able to see exactly what he had done, including all the commands used.

"He was removed from the contract and not allowed to work on that customer again."

Sharky always files off your identifying details. So send me your true tale of IT life at You'll score a sharp Shark shirt if I use it. Add your comments below, and read some great old tales in the Sharkives.

Get your daily dose of out-takes from the IT Theater of the Absurd delivered directly to your Inbox. Subscribe now to the Daily Shark Newsletter.

The march toward exascale computers
View Comments
Join the discussion
Be the first to comment on this article. Our Commenting Policies