<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Obsolete :: Tag :: JP&#39;s Domain</title>
    <link>https://www.jpsdomain.org/tags/obsolete/index.html</link>
    <description></description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <atom:link href="https://www.jpsdomain.org/tags/obsolete/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>OnStream DI-30 Red Hat Backup mini-HOWTO</title>
      <link>https://www.jpsdomain.org/linux/onstream_di-30-redhat_backup_mini-howto/index.html</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://www.jpsdomain.org/linux/onstream_di-30-redhat_backup_mini-howto/index.html</guid>
      <description>Obsolete Content This content is obsolete, but I am leaving it here as a historical reference.&#xA;by JP Vossen, CISSP; JPATjpsdomainDOTorg , https://www.jpsdomain.org/linux/onstream_di-30-redhat_backup_mini-howto/ $Revision: 1.5 $, $Date: 2026-02-15 15:31:17 -0500 (Sun, 15 Feb 2026) $ UTC&#xA;Introduction See “Update (2003-11-29)–OnStream Bankrupt again” for important bankruptcy information about OnStream.&#xA;This document describes how to use an OnStream DI30 tape drive with Red Hat Linux and several free backup utilities. It is intended for a anyone planning to use an OnStream DI-30 tape drive, or anyone trying to backup Linux, especially Red Hat. Most especially, it’s intended for anyone trying to do both!</description>
    </item>
    <item>
      <title>GNATBox Firewall Installation Quick Reference</title>
      <link>https://www.jpsdomain.org/infosec/gnatbox/index.html</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://www.jpsdomain.org/infosec/gnatbox/index.html</guid>
      <description>Obsolete Content This content is obsolete, but I am leaving it here as a historical reference.&#xA;Introduction This is a quick reference guide for installing the free GNATBox Light firewall. GNATBox Light is a complete hardened, stateful, BSD-based firewall that fits on a single floppy disk (how cool is that?). See below for references. You can download a Word document with some sample Avery 5196 diskette labels at http://www.jpsdomain.org/public/ /GNATBox_Diskette_Labels.doc. Also check out my Home Networking diagram and explanation at http://www.jpsdomain.org/infosec/home_networks.html.</description>
    </item>
    <item>
      <title>SOHO Information Security</title>
      <link>https://www.jpsdomain.org/infosec/home/index.html</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://www.jpsdomain.org/infosec/home/index.html</guid>
      <description>Obsolete Content This content is obsolete, but I am leaving it here as a historical reference.&#xA;With the advent of more widespread broadband (cable modem, xDSL) Internet access and the greater proliferation of SOHO (Small Office/Home Office) and Virtual Offices, Information Security is becoming more important at home as well as at work.&#xA;Home Network Designs Recently the question about how to design a relatively secure home network has been coming up a lot. So rather than trying to draw the same thing on whatever napkin happens to be handy, I diagrammed the four most common home network designs, and wrote some text that fleshes out the details. See home_networks.html. Zone Labs, now part of Check Point Software has a similar sort of PDF document.</description>
    </item>
    <item>
      <title>Typical Home Network Designs</title>
      <link>https://www.jpsdomain.org/infosec/home_networks/index.html</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://www.jpsdomain.org/infosec/home_networks/index.html</guid>
      <description>Obsolete Content This content is obsolete, but I am leaving it here as a historical reference.&#xA;The Risks… Are real.&#xA;There is no security through obscurity. While is it true that it’s very unlikely that someone will specifically try to hack you, that doesn’t matter! There are a large number of hacking tools that simply scan a range of IP Addresses (similar to telephone numbers) for a vulnerability. If you happen to have an IP Address in the target range, and if you happen to have that vulnerability–you are hacked–simple as that. :-(</description>
    </item>
    <item>
      <title>Windows Voodoo</title>
      <link>https://www.jpsdomain.org/windows/winvoodoo/index.html</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://www.jpsdomain.org/windows/winvoodoo/index.html</guid>
      <description>Obsolete Content This content is obsolete, but I am leaving it here as a historical reference.&#xA;Introduction Does your computer ever do any of the following, “just for the heck of it,” with no rhyme or reason? Does it do it a lot? More than once or twice a day?</description>
    </item>
    <item>
      <title>Favorite Utilities, Tools, Software for Windows</title>
      <link>https://www.jpsdomain.org/windows/win-tools/index.html</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://www.jpsdomain.org/windows/win-tools/index.html</guid>
      <description>Obsolete Content This content is obsolete, but I am leaving it here as a historical reference.&#xA;As far as I know, all of these tools are free unless otherwise noted.&#xA;Use any ZIP program, such as WinZip or InfoZip’s FREE Unzip to extract the ZIP files.&#xA;(Old) Disk &amp; File Utilities BootPart Lets you create DOS and Win95 boot sectors for the NT Loader (NTLdr.exe). IT also lets you fix broken NT boot sectors. Very nice little freeware tool. For more information about NT Boot Sectors, you can check this direct boot page. delpart.exe Old Microsoft utility to delete partitions – ANY partitions. Great for removing NTFS partitions from a bootable DOS floppy, or for those times when FDisk confuses itself and will not let you remove an extended partition because it says there are logical drives, but when you try to delete the logical drives it says there aren’t any… dirmatch.com From PC Magazine, allows you to compare two different directories (see FreeCommander, below). Since this is so old (DIRMATCH 3.1 (c) 1989 Ziff Communications Co.) it doesn’t really work with long filenames. (If you have problems downloading try dirmatch.com.txt and rename it to remove the trailing .txt.) freeCommander A dual-pane file manager for all 32-bit windows platforms (i.e. 95/98/NT/2000). It is a free program, similar to an updated Norton Commander. Nicer and more current than 2xExplorer. 2xExplorer An obsolete dual-pane file manager for all 32-bit windows platforms (i.e. 95/98/NT/2000). It is a free program, similar to an updated Norton Commander. Use the previous one instead. mcopy.exe Copies only newer files. obslt10.zip Deletes files older than the date/time specified. Excellent for purging log and temp files, etc. UNIX Utilities for Windows FREE tools from 3Com Including 3CDaemon an Integrated TFTP/FTP/Syslog Daemon for Windows 95/98/NT. Win32-ports of tools with a GNU or similar open source license These are the “official” GNU Win32 ports. GNU utilities for Win32 Really awesome “native” Win32 ports of some UNIX tools. Native in this context means that no emulation layer (e.g. CygWin) is needed. This avoids a lot a installation complexity. With these native tools, you unzip ’em and run ’em! bc-1.05, bison-1.28, bzip2-1.0.2, diffutils-2.7, fileutils-3.16, findutils-4.1, flex-2.5.4, gawk-3.1.0, grep-2.4.2, gsar110, gzip-1.2.4, indent-2.2.9, jwhois-2.4.1, less-340, m4-1.4, make-3.78.1, patch-2.5, recode-3.6, rman-3.0.7, sed-3.02, shellutils-1.9.4, tar-1.12, textutils-2.1, unrar-3.00, wget-1.8.2, which-2.4. David’s Programs and Source Code UNIX or UNIX-like tools, including cat.exe, bin2bmp.exe, bmpdump.exe, detab.exe, diskuse.exe, ebcdic.exe, entab.exe, fsplit.exe, fstat.exe, gifdump.exe, hdump.exe, head.exe, reboot.com, scram.exe, scram.doc, snow.exe, tcopy.exe, tee.exe, tod.com, unicode.exe, uniq.exe, vdate.exe, vecho.com, vfind.exe, whence.exe, wordc.exe Mountain Math Software’s port of GNU Bash to Windows NT. It it listed as a beta, and for Windows 3.51, but it runs under NT 4. I have not tested it much though. See the Readme.txt or download the archive (~ 1.7 meg). Licensed under GNU (free), and stand alone (i.e. does not need DJGPP or CygWin). tcsh Free GNU, stand alone (i.e. does not need DJGPP or CygWin). Read the Readme.NT. pgrep.com DOS port of a version of the grep command. Can handle “|” under DOS/Windows. DOS2UNIX.COM &amp; UNIX2DOS.COM (from The free Win32 software page at BASTET.COM) Convert CRLF to LF and LF to CRLF respectively. While the programs above are ports of various UNIX tools, the next four items are complete UNIX environments for the PC. DJGPP is older, and has not been updated too much (not that it needs it). DJ Delorie went to work on the Cygwin project after he wrote DJGPP. Both environments are very cool! I don’t know too much about the other two, and have never used them.</description>
    </item>
    <item>
      <title>Windows port of Logcheck</title>
      <link>https://www.jpsdomain.org/windows/winlogcheck/index.html</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://www.jpsdomain.org/windows/winlogcheck/index.html</guid>
      <description>Obsolete Content This content is obsolete, but I am leaving it here as a historical reference.&#xA;Introduction Welcome to the Windows port of Logcheck (now called LogSentry), the famous UNIX log processing tool. Psionic was bought by Cisco who has moved the cool Abacus tools, including LogSentry, to http://sourceforge.net/projects/sentrytools/&#xA;As you probably know if you are bothering to read this, LogSentry helps spot problems and security violations in your logfiles automatically and will send the results to you in e-mail. However, it can only work with what it’s given. I personally find the Windows Event Logs to be verbose, yet un-informative. So when you get e-mailed messages with three or 4 lines on arcane gibberish, remember that it’s the same information as you would see in the Event Log, except it’s in a slightly different format, and you are actually SEEING it! (Of course, you would have reviewed the Event Logs anyway, right?) :-)</description>
    </item>
  </channel>
</rss>