Skip to main content

Visiting Cabletron in New Hampsire

It was a cold winter.  In any case, for a South Africa at least.  Cabletron was big in the LAN business and had a large amount of Ethernet kit and some token-ring.  They were trying to update their product portfolio with switches as they only had bridges.
We arrived there on a freezing day in December.  The snow was lying in drifts.  There were a few cars in the car park but no people about.  I saw for the first time in my life a frozen pond next to the car park!  This fascinated me!  I walked out onto the pond.  I jumped up and down and then found a rock to bang on the ice to try and crack it.
Unbeknown to me the whole building was watching me through those opaque glass windows.  I never realized that until I walked into the building.
Must be why they never bought those Madge Ringswitches.
PS:  I recall clambering around a nuclear submarine that was on display near our hotel on the New Hampshire coast on the weekend!


Popular posts from this blog

LDWin: Link Discovery for Windows

LDWin supports the following methods of link discovery: CDP - Cisco Discovery Protocol LLDP - Link Layer Discovery Protocol Download LDWin from here.

easywall - Web interface for easy use of the IPTables firewall on Linux systems written in Python3.

Firewalls are becoming increasingly important in today’s world. Hackers and automated scripts are constantly trying to invade your system and use it for Bitcoin mining, botnets or other things. To prevent these attacks, you can use a firewall on your system. IPTables is the strongest firewall in Linux because it can filter packets in the kernel before they reach the application. Using IPTables is not very easy for Linux beginners. We have created easywall - the simple IPTables web interface . The focus of the software is on easy installation and use. Access this neat software over on github: easywall


#!/bin/bash # # usage <configuration file> # eg: /etc/ipset-threatblock/ipset-threatblock.conf # function exists() { command -v "$1" >/dev/null 2>&1 ; } if [[ -z "$1" ]]; then   echo "Error: please specify a configuration file, e.g. $0 /etc/ipset-threatblock/ipset-threatblock.conf"   exit 1 fi # shellcheck source=ipset-threatblock.conf if ! source "$1"; then   echo "Error: can't load configuration file $1"   exit 1 fi if ! exists curl && exists egrep && exists grep && exists ipset && exists iptables && exists sed && exists sort && exists wc ; then   echo >&2 "Error: searching PATH fails to find executables among: curl egrep grep ipset iptables sed sort wc"   exit 1 fi DO_OPTIMIZE_CIDR=no if exists iprange && [[ ${OPTIMIZE_CIDR:-yes} != no ]]; then   DO_OPTIMIZE_CIDR=yes fi if [[ ! -d $(dirname &q