Skip to main content

Why Novell and Netware with it went titsup

I previously wrote about why Madge Networks went titsup here. This triggered discussions and thoughts about Novell, the Big Red. In the early nineties my first LAN installation were done using IBM PS/2 servers running LAN Manager from IBM on token-ring. I then started work at a company who did Novell Netware installations. I started on Netware 3.11 but often had to support Netware 2 installation. This was the days of DOS and OS/2. It was the days before the Internet where drivers updates and bugfixes were downloaded from a BBS using 9.6k baud modem. It had to be a US Robotics and I can safely say I spend more time with that modem than anything else. All software came shrink wrapped. The Novell Software came in a Big Red box, shipped freshly shrink wrapped from the Mormons.

Read the article over at LinkedIn here.


Popular posts from this blog

LDWin: Link Discovery for Windows

LDWin supports the following methods of link discovery: CDP - Cisco Discovery Protocol LLDP - Link Layer Discovery Protocol Download LDWin from here.

easywall - Web interface for easy use of the IPTables firewall on Linux systems written in Python3.

Firewalls are becoming increasingly important in today’s world. Hackers and automated scripts are constantly trying to invade your system and use it for Bitcoin mining, botnets or other things. To prevent these attacks, you can use a firewall on your system. IPTables is the strongest firewall in Linux because it can filter packets in the kernel before they reach the application. Using IPTables is not very easy for Linux beginners. We have created easywall - the simple IPTables web interface . The focus of the software is on easy installation and use. Access this neat software over on github: easywall


#!/bin/bash # # usage <configuration file> # eg: /etc/ipset-threatblock/ipset-threatblock.conf # function exists() { command -v "$1" >/dev/null 2>&1 ; } if [[ -z "$1" ]]; then   echo "Error: please specify a configuration file, e.g. $0 /etc/ipset-threatblock/ipset-threatblock.conf"   exit 1 fi # shellcheck source=ipset-threatblock.conf if ! source "$1"; then   echo "Error: can't load configuration file $1"   exit 1 fi if ! exists curl && exists egrep && exists grep && exists ipset && exists iptables && exists sed && exists sort && exists wc ; then   echo >&2 "Error: searching PATH fails to find executables among: curl egrep grep ipset iptables sed sort wc"   exit 1 fi DO_OPTIMIZE_CIDR=no if exists iprange && [[ ${OPTIMIZE_CIDR:-yes} != no ]]; then   DO_OPTIMIZE_CIDR=yes fi if [[ ! -d $(dirname &q