Thursday, August 13, 2009

I'm a rebel . . . a sneaky one

So if you can't tell from My previous post, I really don't like the encryption software they put on my school owned laptop. It slowed down my computer (alot), was generally annoying, completely unwarranted and it fubared my machine.

They managed to bring my computer back from the dead, but as is common with such things, not without some issues cropping up. For example my documents folder had become hidden and it wouldn't let me unhide it, and windows picture viewer was really slow ( I could load photoshop faster).

So I backed up everything onto my other older computer just in case.

Couple of week later I got adventurous and turned the sleep function back on because hibernation was just to slow. In short the same thing happens again. It goes to sleep, freaks out when it wakes up, and won't boot. I get looking online and it turns out the software is incompatible with Vista's hybrid sleep. Turn out when my university's IT guys put this software on my machine, and should have disabled the "hybrid sleep" but didn't. In 2 min. on the companies web site I figured out a problem that they probably still don't know about. This time the file system was completely corrupted. With a lot of work and some special software they might have been able to recover my files, but I had backups so I really didn't care.

So I had a choice I could 1: take in my computer, explain their incompetence and need to research their supported products better, insult there parentage, accuse them of buying a degree from a shady internet site that has since been shut down, and present them with the long and labor intensive task of fixing my computer with the understanding that it will run flawlessly when it is returned, or 2: throw off this buggy cryptographic oppression by decrypting the hard drive myself, and begin a computational new life with a fresh install of Windows that I can put to sleep with out fear of corruption from my bane called PGP.

I'd have preferred an option #3 that took in the best parts of 1 and 2, namely the name calling and then not having the encryption software. I doubt after calling them names they'd let me ignore school policy.

So I have rebelled; by chosing option 2 I refuse to conform; I'll no longer be at the mercy of incompetent IT departments; I will be the master of electronic domain; I can mess up my computer all by my self and need no help from anyone else to do it; I'll stand up and let my voice be heard . . .strike that . . . I'll be very careful not to let them know I'm braking the rules.

2 comments:

LizMcG said...

Which is exactly why you posted your sneakiness on an open blog.
It's a good thing that no one reads it.

Spike said...

I don't know rather than reading up on job related stuff they could spend all there time spying on people. The did mention they still had a back up of my hard drive 2 weeks after I'd brought my computer in to be encrypted.

in seriousness I would not be surprised to find out they occasionally snoop though peoples computers