|What is juvenile here is this exchange, I too am an adult, despite grammatical evidence to suggest otherwise. Touché ole boy. I mean no disrespect. It is however, aggravating enough to be up to elbows with mysterious and challenging technological issues, atop employee time, payrolls, vendors, timelines, taxes, hiring...etc.; but then,in the wee hours of the night, upon seeking some measure of intelligence by asking a question to start a discussion, what you find is that the only thing gleaned from your plea enough to muster a response, is the sarcastic critique of someone who seems to have the luxury of conviction about you. Only, "Conviction is luxury afforded only to those on the sideline." -Vince Lombardi|
Now, while my daily grind does not mean a hill of beans to you or anyone else, it equally requires the same of you whether you choose to offer only mocking or you choose to offer a comment that may just enlighten another. Easy to examine in hindsight I know, as I know this is merely an opinion. Despite it likely reading as a bit condescending here or there, its not my ambition herein. (well maybe a smidge), but nonetheless the other stuff I offer whole hearted, in genuine need of insight, thinking this may be a good resource to find help. I've a small business, only ten employees, but I am the only one driving this bus, and whatever may come, not a thought goes to insuring there's a check for each of them every other week. Like in Goodfellas, I hope you're familiar... "..house burned down?.. f-you, pay me!; wife's sick?... f-you , pay me!" I've made my point and I digress. I apologize.
So, via an initial question surely to be followed by ancillary ones, I hoped to discover insight that can establish some measure of parameters to these security, stability and tech concerns. Simple yet apparently difficult for me to clearly explain questions like, can a security measure be taken over and updates or access or discovery then be modified, controlled and evade easy detection... remaining just out of sight just doing whatever it does, why??, I cant understand. How does a pain in the ass for one stranger prove to provide some beneficial effect to some other complete stranger? Never met, never will, haven't spoken, don't need to... in fact two or more for whom the very phenomenon of which I speak, is the sole common denominator.?! Strange times we live in... I recall some notion that computers were to and would make our lives easier.?, In as many and more ways it does I admit. It's the myriad of complexity that keeps steamrolling along, just imagining and configuring evermore gadgetry, connectivity, and integration. Which, is amazing and just is incredible what can be done... but this is my point... It is wholly terrifying just what C A N be done. To you,... for reasons you'll only wonder and from nothing you did. Its the corner I am facing at times. In escalating frequency I endure bothersome hiccups both in office network and from home office, whether local or remote networked, and when the dysfunction becomes distracting, then debilitating, I have called in the requisite qualified IT professional. Qualified is being kind as they mostly do the same or close to analysis or via some typically online scan, an evaluation is reached, and the options are offered. Begging my questions here about are those typically dependable.. apart from a complete wipe and reinstall, what can be relied on to be the clean safe benchmark whether to start from or to compare to. Actually, this raises another long held wonder of mine... Out of the box any software is presumably as publish as intended. Like any other, first thing is you require an update to bring current any updates, issues, patches, etc.. Now... in so doing, by going online while NOT current and theretofore vulnerable; can the process of maintaining protective measures be corrupted too.
Lastly, know that I've gone so far as to recently start from scratch, as there had been so many different chefs over time working on the same soup... my server; that the only way to rest assured that a configuration and setup would be from scratch was to do just that. start from scratch. 6desktops, three laptops, one server, and three network printers, one copier networked... as a firewall device. Just under over ten grand, and over the last half year, with one tech outfit from install forward, another four grand. Regrettably my data despite redundant backups, and my ease from assurance of secure and stable system seems to either resurfaced or remained, or even reoccurred from the install or from user behavior. My guess is both, regardless, the mysterious changes, additions, ever capabilities and functions that I've no use for and don't completely know what or why they are there... all keep building. The most recent visit, invoiced for over 500$, and by my estimation seem like breakdowns or problems as much from use as they are pointing to incorrect or lacking setup and or maintenance. This, despite clearly stating and demonstrating the goals via complete system overhaul. I am bewildered.
!5 grand, nearly a year since "fresh start"... and I've much of the same or same ish problems, and beg the same questions or answers.
And more.... as you pointed out... I write with the grammatical precision of a six year old.
What say you... guru?
Thanks, that felt sort of good, if you don't mind.