|
Home | Switchboard | Unix Administration | Red Hat | TCP/IP Networks | Neoliberalism | Toxic Managers |
(slightly skeptical) Educational society promoting "Back to basics" movement against IT overcomplexity and bastardization of classic Unix |
News | See also | Reference | Windows 2000 Resource Kit | Windows Server 2003 Resource Kit | SFU | Microsoft Registry tools |
|
|
New Tools in Windows NT 4.0 Resource Kit, Supplement 4
Date Released: June 1999
The following tools are new for Windows NT 4.0 Resource Kit, Supplement 4:
| Creatals.exe: Modify Domain_Create_Alias |
| Dhcmp.exe: Heap Compare |
| Dnscmd.exe: DNS Server Troubleshooting Tool |
| Expand.exe: File Expansion Utility |
| List.exe: Text Display and Search Tool |
| Memsnap.exe: Memory Profiling Tool |
| PPTP Ping: Point-to-Point Tunneling Protocol Ping Utilities |
| Remote Administration Scripts |
| RPC Ping: RPC Connectivity Verification Tool |
| Snmputilg.exe: SNMP Troubleshooting Tool |
| Vfi.exe: Visual File Information |
For more information about these new tools, refer to the Windows NT 4.0 Resource Kit Tools Help File (ntrktool.chm).
This command-line utility modifies the DOMAIN_CREATE_ALIAS right on a domain so that only domain administrators can create domain local groups.
The default Windows NT user rights allow non-administrative users to create domain local groups. Domain local groups reside only on domain controllers that share a single security account manager (SAM).
A non-administrative user could potentially abuse the ability to create aliases on a domain by creating a large number of domain local groups and causing the size of the account database to grow without restrictions. Unlimited local group creation could cause the domain controller to crash and create excessive network traffic because of the replication of local group information to backup domain controllers.
This tool must be run by the Domain Administrator on the Primary Domain Controller.
CreatAls runs on Windows NT 4.0 and previous versions on Windows NT.
CreatAls Syntax
creatals [-daccount] [-gaccount] [-a] [-r] [-l] [-?]
Where:
-daccount denies CreateAlias access to the specified account.
Note CreateAlias cannot be denied to Administrators. -gaccount
grants CreateAlias access to the specified account. -a restricts
access to Administrators/AccountOps only. -r resets the ACL to the
Windows NT 4.0 default. -l lists the accounts that have CrealeAlias
Access -? displays command-line syntax (as does creatals without
arguments).
You can use any number of -d and -g arguments. CreatAls, however, doesn't check for consistency in the arguments: it simply processes the arguments one at a time. This means that you should carefully determine the required accesses. For most purposes, you should use the -a or the -r option. The -d and -g options allow for greater control, but require more diligence in determining the correct settings.
File Required
Creatals.exe
For more information
See Microsoft Knowledge Base Article 169556 in Microsoft TechNet.
This command-line tool compares two dumps of heap usage from Dh.exe, matching the backtraces from each file, to find leaks.
Files Required
Dhcmp.exe
Dnscmd.exe is a command line tool designed to assist administrators in DNS management.
DNScmd allows the administrator to view the properties of DNS servers, zones and resource records. In addition DNScmd can be used to manually modify these properties, to create and delete zones and resource records, and to force replication events between DNS server physical memory and DNS databases/datafiles.
Note DNScmd enhances the functionality of and replaces Dnsstat.exe, a tool included in previous Resource Kits.
DNScmd Syntax
dnscmd ServerName Command [Command Parameters]
Where:
ServerName
Is the name of the DNS server the administrator is planning to manage, represented by one of the following:
| local machine using LPC |
| IP address - RPC over TCP/IP |
| DNS name - RPC over TCP/IP |
| NetBIOS name - RPC over named pipes |
Command
Is one of the commands listed below.
Command Parameters
Are the optional parameters associated with some of the commands listed below.
/Info
Provides DNS Server properties.
/ResetRegistry
Resets a property of a server or zone.
/Restart
Restarts the specified DNS server.
/ClearCache
Clears the cache of the specified DNS server.
/UpdateServerFile
Writes datafile for the specified zone.
/ResetListenAddresses
Resets/selects server IP address(es) to serve DNS requests.
/ResetForwarders
Resets/selects forwarders IP address(es).
/EnumZones
Enumerates zones on the specified DNS server.
/ZoneAdd
Creates a new zone on the specified DNS server.
/ZoneDel
Deletes specified zone from the specified DNS server.
/ZonePause
Pauses the specified zone on the specified DNS server.
/ZoneResume
Resumes the specified zone on the specified DNS server.
/ZoneReload
Reloads the specified zone from its database (file or DS) on the specified DNS server.
/ZoneWriteBack
Writes back the specified zone to the file on the specified DNS server.
/ZoneRefresh
Forces refresh of the specified secondary zone on the specified DNS server from its master.
/ZoneUpdateFromDs
Updates the specified DS integrated zone by data from DS on the specified DNS server.
/ZoneResetType
Changes a type (Primary/Secondary/DSintegrated) of the specified zone on the specified DNS server.
/ZoneResetNotify
Sets/resets a notify list for the specified zone on the specified server.
/RecordAdd
Creates a record in the specified zone or RootHints on the specified DNS server.
/RecordDel
Deletes a record from the specified zone or RootHints on the specified DNS server.
/NodeDel
Deletes all records at a name from the specified zone, RootHints or Cache at the specified DNS server.
File Required
Dnscmd.exe
This command-line tool enables you to expand files that have been compressed by Compress.exe: File Compress.
Files Required
Expand.exe
This simple text display and search tool lists the contents of a file. Unlike other text display tools, List is a good tool for looking at large text or log files because it does not read the whole file into memory when you open it.
List is useful for displaying text or log files remotely and for use on servers where administrators are concerned with degradation of system performance.
List Syntax
list [-s:string] [-g:line#] filename[, filename, ...]
Where:
-s:string
is the string to search for after opening the file.
-g:line#
is the line to jump to after opening the file.
filename[, filename, ...]
is the name of the file(s) to open and display.
For help on List commands and switches, press F1.
Files Required
List.exe
This memory profiling tool takes a snapshot of the memory resources being consumed by all running processes and writes this information to a log file.
MemSnap logs system memory usage to a log file with the default name of Memsnap.log; however, any file name can be chosen by specifying it at the command line when starting the tool.
Memory Profiling Tool Syntax
memsnap [logfile]
Where:
logfile
is the name of the file where Memsnap writes its information (the default is Memsnap.log).
File Required
Memsnap.exe
Pptpclnt.exe and Pptpsrv.exe are tools that work in unison to verify that the required protocol and port for Point-to-Point Tunneling Protocol (PPTP) is being routed from a PPTP client to a PPTP server or vice-versa.
In order for a PPTP client to access a remote PPTP server, all routers in between the two hosts must allow traffic to pass through TCP port 1723 (PPTP) and must support protocol type 47. Protocol type 47 is the GRE (Generic Routing Encapsulation) protocol.
Note This tool is not meant to test the functionality of a PPTP server or a PPTP client. It is meant to assure that the path between the two hosts is passing through TCP port 1723 and using the GRE protocol (type 47).
Files Required
Pptpclnt.exe
Pptpsrv.exe
The Remote Administration Scripts are a collection of Visual Basic scripting tools designed to perform specific administrative tasks using Microsoft Windows Management Instrumentation (WMI). Rscripts.chm is an HTML Help file that documents the Remote Administration Scripts.
Files Required
| Rscripts.chm - Documentation for Remote Administration Scripts |
| Visual Basic script (.vbs) files |
These files are located in the \Vbsscripts folder of the Windows NT Resource Kit.
This tool can confirm RPC connectivity between Microsoft Exchange Server and any of the supported Microsoft Exchange Client workstations on the network. RPC Ping checks if Microsoft Exchange Server services are responding to RPC requests from client workstations via the network.
Rpings (Server) Syntax
rpings [-p ProtocolSequence]
Where:
ProtocolSequence
is the friendly name for one of the supported transport mechanisms of RPC, as follows:
Friendly Name | Description |
namedpipes |
NCA connection over Named Pipes (ncacn_np) |
tcpip |
NCA connection over TCP/IP (ncacn_ip_tcp) |
netbios |
NCA connection over NetBIOS on Netbeui (ncacn_nb_nb) |
ipx/spx |
NCA connection over SPX (ncacn_spx) |
vines |
NCA connection over Banyan Vines (ncacn_vns_spp) |
Note Enter '@q' to exit RPing.
Rpingc, Rpingc16, Rpingdos (Client) Syntax
Rpingc is the 32-bit version of the client side of the RPC Ping tool. Rpingc16 and Rpingdos are the 16-bit versions of the client side. They will connect and bind to the specified destination RPC server and display the status, available protocol sequences with end points, and quality of the RPC connection. Both Rpingc and Rpingc16 are set up to run in the Windows environment. Rpingdos runs in the MS-DOS environment.
Rpingc & Rpingc16 Options
Exchange Server:The name of the Exchange Server to ping
Protocol Sequence:The following options are available:
Any (default)
Named Pipes
IPX/SPX
TCP/IP
Netbios
Vines
End Point:The following End Points on the Exchange Server are available:
Rping (default, all)
Store (the Exchange Store)
Admin (the Exchange Administrator)
Number of Pings:Continuous
Stop at ___
Mode:Ping Only (character echoed by RPINGS)
End Point Search (enumerates all endpoints available)
Run with Security:verifies that authenticated RPCs work
rpingdos [-p ProtocolSequence] -n NetworkAddress [-e EndPoint] [-c xxx] [-s]
Where:
-p ProtocolSequence
sets the protocol sequence, using these friendly names for protocols:
namedpipes
tcpip
ipx/spx
netbios
vines
The default is namedpipes
-n NetworkAddress
is required.
-e EndPoint
is the endpoint to find., Defaults to Rping.
-c xxx
is the number of pings., Defaults to 1.
-s
runs an endpoint search.
Protocol sequences can be set using these friendly names:
-p namedpipes
-p tcpip
-p ipx/spx
-p netbios
-p vines
Files Required
Server Component
| Rpings.exe (for the Microsoft Exchange Server for Windows NT) |
Client Component
| Rpingc.exe (for Windows NT, and Windows 95/98) |
| Rpingc16.exe (for Windows 3.1x clients) |
| Rpingdos.exe (for MS-DOS clients) |
SnmpUtilG is a graphical tool that complements the older command prompt SNMP browser tool (Snmputil.exe). System administrators can use either tool to obtain information from SNMP-manageable systems on the network.
You can use SnmpUtilG to perform the basic SNMP operations such as GET, GET-NEXT, and SET from a graphical interface. SnmpUtilG also supports saving SNMP data to the clipboard, as well as saving data to comma delimted text files.
Caution Even though many OID values are "read only" by default, you should use the SNMP SET command with caution. Incorrect use of this tool might cause network name resolution or network connectivity problems adversely impacting performance.
Snmputilg.exe
For more information
For background on SNMP and MIBs, see "Using SNMP for Network Management," Chapter 11 in Windows NT Server Networking Guide.
MIBs are also documented in detail in "MIB Object Types for Windows NT," Appendix C in Windows NT Server Networking Guide.
Visual File Information retrieves and generates file information. You can use this information for testing purposes to detect what files have changed in different versions of applications or what the difference are between two seemingly identical machines. This information is also valuable to track different versions of resources that normally don't store version information. Results can be copied to the clipboard or save it out to a tab-delimted file or Excel file.
The following information (if present) is diplayed for each file:
| File Path |
| File Name |
| Ext |
| Size |
| Date |
| Time |
| Attribs |
| File Version |
| Product Version Language |
| Code Page |
| OS |
| Type |
| File Flags |
| CRC-32 |
| ISO 9660 |
File Required
Vfi.ex
Top of page
The following tools run only on x86-based computers:
| Cluster Verification Utility |
| Cmdhere.exe: Command Prompt Here |
| Installation Monitor |
| Microsoft Remailer |
| NetTime for Macintosh
Note NetTime for Macintosh runs only on Macintosh and x86-based computers. |
| Nlmon.exe: NLMonitor |
| Nltest.exe |
| Ntdetect.com (Installd.cmd): Startup Hardware Detector |
| Oleview.exe: OLE/COM Object Viewer |
| Runext.exe: Run Extension |
| Shutdown.exe: Remote Shutdown |
| TweakUI |
| Uptomp.exe: Processor Upgrade Utility |
Release Notes Microsoft Windows NT 4.0 Resource Kit Supplement 4
To install the POSIX source code
| At the command prompt, type the following lines:
md c:\posix xcopy cd_driveletter:\platform\Scrpting\posix\source c:\posix\ /s /e /ic: cd \posixlongname |
The following utilities may require code changes to make them work on RISC-based computers: AR.EXE, CC.EXE, DEVSRV.EXE, LD.EXE, MAKE.EXE. For example, CC.EXE invokes "CL386" to compile other programs; on RISC-based computers, you must change the code to invoke the proper compiler.
The following copyright notice applies to both the POSIX utilities provided in binary form as well as the source code on the CD.Copyright (c) 1988, 1989, 1990 The Regents of the University of California. All rights reserved.
This code is derived from software contributed to Berkeley by Adam de Boor.This software and documentation is based in part on BSD Networking Software licensed from the Regents of the University of California, Berkeley. We acknowledge the role of the Computer Systems Research Group and the Electrical Engineering and Computer Sciences Department of the University of California, Berkeley, and the Other Contributors in its development.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:1. | Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. |
2. | Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. |
3. | All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of California, Berkeley and its contributors. |
4. | Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. |
The following is a list of tools included in the Windows NT 4.0 Resource Kit, Supplement 4:
-A-
Addusers.exe: Add Users
Apimon.exe: API Monitor
Associate.exe
Auditcat.hlp: Audit Categories Help
Auditpol.exe: Audit Policy
Autoexnt.exe: AutoExNT Service
-B-
Breakftm.exe: Automated Mirror Break/Restore Utility
Browmon.exe: Browser Monitor
Browstat.exe: Browser Status
-C-
C2config.exe: C2 Configuration Manager
Chgprint.exe: Change Printer Utility
Chklnks.exe: Link Check Wizard
Choice.exe: User Input for Batch Files
Clearmem.exe: Clear Memory
Clip.exe: Clip To Clipboard
Clipstor.exe: Clipboard Storage
Cliptray.exe: Clip Tray
Cluster Verification Utility
Cmdhere.exe: Command Prompt Here
Compreg.exe: Compare Registry
Compress.exe: Compress File(s)
Connection Manager Administration Kit
Counters.hlp: Performance Counters Help
Cpustres.exe: CPU Stress Utility
Creatals.exe: Modify Domain_Create_Alias
Creatfil.exe: Create File
Ctrlist.exe: Counter List
-D-
Debugger Extensions: Windows NT 4.0 OEM Support Tools
Debugger Tools: Windows NT 4.0 Debugger Tools
Defptr.exe: Default Printer
Delprof.exe: User Profile Deletion Utility
Delsrv.exe: Delete Service
Depends.exe: Dependency Walker
Desktops.exe: DeskTops
Dh.exe: Display Heap
Dhcmp.exe: Heap Compare
Dhcpcmd.exe: DHCP Administrator's Tool
Dhcploc.exe: DHCP Server Locator Utility
Diruse.exe: Directory Disk Usage
Diskmap.exe: Disk Map
Diskuse.exe: Disk Use
Dnscmd.exe: DNS Administrator's Tool
Dommon.exe: Domain Monitor
Dotcrash.exe: DotCrash
Drivers.exe: List Loaded Drivers
Dskprobe.exe: Disk Probe
Dumpel.exe: Dump Event Log
Dupfinder.exe: Duplicate Finder
-E-
Empty.exe
Exctrlst.exe: Extensible Performance Counter List
Exetype.exe: Executable Type
Expand.exe: Expand File
Extract.exe: Extract File
-F-
Fcopy.exe: File Copy Utility for Microsoft Message Queue Server
Filever.exe: File Version
Findgrp.exe: Find Group
Fixacls.exe: FixACLS
Floplock.exe: Lock Floppy Disk Drives
Forfiles.exe: Forfiles
Freedisk.exe: Free Disk Space
Ftedit.exe: Fault Tolerance Registry Information Editor
-G-
Getmac.exe: Get MAC Address
Getsid.exe: Getsid
Gflags.exe: Global Flags
Global.exe: Global Groups
Grpcpy.exe: Group Copy
-H-
Hardware Compatibility List Web site
Heapmon.exe: Heap Monitor
-I-
Ifmember.exe
Imagination Engineer LE by Intergraph
Installation Monitor
Instsrv.exe: Service Installer
Intergraph Imagination Engineer LE
Internet Explorer Administration Kit
Internet Explorer Web Accessories
Internet Information Server Performance Workspace Presets
-J-
No tools.
-K-
Kernprof.exe: Kernel Profiler
Kill.exe: Kill
Kix32.exe: Kixstart 95
-L-
Leakyapp.exe: Leaky Application
List.exe
Local.exe: Local Groups
Logevent.exe: Log Event
Logoff.exe: Logoff
Logtime.exe: Logtime
-M-
Mcopy.exe: Multiple Copy
Memsnap.exe: Memory Profiling Tool
Mibcc.exe: SNMP MIB Compiler
Microsoft Connection Manager Administration Kit
Microsoft Remailer
Munge.exe: Munge
Mtc.exe: Multiple Tree Copy
-N-
Netclip.exe: Remote Clipboard Viewer
Netcons.exe: Network Connections
Netdom.exe: Windows Domain Manager
Netsvc.exe: Remote Service Controller
Nettime.exe: NetTime Sync
Nettime.hqx: NetTime for Macintosh
Netwatch.exe: Network Watcher
Nlmon.exe: NLMonitor
Nltest.exe
Now.exe: Now
Ntdetect.chk: Startup Hardware Detector (debug version)
Ntevntlg.mdb: Windows NT Event Log Database
Ntimer.exe
Ntmsgs.hlp: Windows NT Messages
Ntrights.exe: NTRights
-O-
Oh.exe: Open Handles
Oleview.exe: OLE/COM Object Viewer
Os2api.txt: OS2 API Information
-P-
Passprop.exe: Passprop
Pathman.exe: Path Manager
PerfMon Chart Setting Editor (Setedit.exe)
Perfmtr.exe: Performance Meter
Perl 5 Scripting Language
Permcopy.exe: Permission Copy
Perms.exe: Permissions
Pfmon.exe: Page Fault Monitor
Pmon.exe: Process Resource Monitor
Poledit.exe: Policy Editor
PPTP Ping: Point-to-Point Tunneling Protocol Ping Tools
Printmig.exe: Printer Migrator
Probe.exe: Response Probe
Profile.exe: Sampling Profiler
Profiles.doc: Guide to Windows NT 4.0 Profiles and Policies
Pstat.exe: Process and Thread Status
Pulist.exe
Pview.exe: Process Explode
Pviewer.exe: Process Viewer
-Q-
Qslice.exe: CPU Usage by Processes
Quickres.exe: Quick Resolution Changer
Quiktray.exe: Quick Tray
-R-
Raslist.exe: RAS List
Rasusers.exe: Remote Access Users
RConsole (Remote Console)
Reg.exe: Registry Management Utility
Regback.exe: Registry Backup
Regdmp.exe: Registry Dump
Regentry.hlp: Technical Reference for the Windows NT 4.0 Registry
Regfind.exe: Registry Search Utility
Regina REXX Scripting Language
Regini.exe: Registry Change by Script
Regrest.exe: Registry Restoration
Remailer
Remote.exe
Riproute.wri: Routing with Windows NT Server
Rmtshare.exe: Remote Share
Robocopy.exe: Robust File Copy Utility
RPC Ping: RPC Connectivity Verification Tool
Rshsvc.exe: Remote Shell Service
Rshxmenu: Security Shell Extension
Runext.exe: Run Shell Extension
-S-
Sc.exe: Service Controller Query Tool
Scanreg.exe: Registry Scan
Sclist.exe: Service List
Seagate Software Crystal Reports for Windows NT 4.0 Resource Kit
Secadd.exe: Registry Security Tool
Setedit.exe: PerfMon Chart Setting Editor
Setupmgr.exe: Setup Manager
Setx.exe: SetX
Shareui.dll: Share UI
Showacls.exe: Show ACLS
Showdisk.exe: Show Disk Space
Showgrps.exe: Show Groups
Showmbrs.exe: Show Members
Showperf.exe: Performance Data Block Dump Utility
Shutdown.exe: Shutdown
Shutgui.exe: Remote Shutdown GUI
Sipanel.exe: Soft Input Panel
Sleep.exe: Batch File Wait
Snmpmon.exe: SNMP Monitor
Snmputil.exe: SNMP Utility
Snmputilg.exe: SNMP Troubleshooting Tool
Soon.exe: Soon
Srvany.exe: Applications as Services Utility
Srvcheck.exe: Server Share Check
Srvinfo.exe: Server Information
Srvinstw.exe: Service Installation Wizard
Su.exe
Subinacl.exe
Svcmon.exe: Service Monitoring Tool
Sysdiff.exe: Automated Installation Tool
-T-
Tdishow.exe: TDI Tracing Utility
Textview.exe: TextView
Timeout.exe: Timeout
Timeserv.exe: Time Synchronizing Service (Y2K Unverified)
Timeserv.exe: Time Synchronizing Service (Y2K)
Timethis.exe: Time This
Timezone.exe: Daylight Savings Time Update Utility
Tlist.exe: Task List
Tlocmgr.exe: Telephony Location Manager
Top.exe: Time-Ordered Processes
Totlproc.exe: Total Processors
Translate.exe: Translate Error Message
Tweakui.cpl: Tweakui
Typeperf.exe: Performance Data in the Command Window
Tzedit.exe: Time Zone Editor
-U-
Uptomp.exe: Processor Upgrade Utility
Usrstat.exe: User Statistics
Usrtogrp.exe: Add User to Group
-V-
Vadump.exe: Virtual Address Dump
Vfi.exe: Virtual File Information
Virtual Motion Remote Access Manager
-W-
Waitfor.exe: Waitfor
Whoami.exe: WhoAmI
WCAT: Web Capacity Analysis Tool
Winat.exe: Windows AT Scheduler
Windiff.exe: File and Directory Comparison
Winexit.scr: Windows Exit Screen Saver
Winmsdp.exe: Winmsdp
Winschk.exe
Winscl.exe
Wntipcfg.exe: Graphical IPConfig Utility
Wperf.exe
-X-
Xcacls.exe: Xcacls
Society
Groupthink : Two Party System as Polyarchy : Corruption of Regulators : Bureaucracies : Understanding Micromanagers and Control Freaks : Toxic Managers : Harvard Mafia : Diplomatic Communication : Surviving a Bad Performance Review : Insufficient Retirement Funds as Immanent Problem of Neoliberal Regime : PseudoScience : Who Rules America : Neoliberalism : The Iron Law of Oligarchy : Libertarian Philosophy
Quotes
War and Peace : Skeptical Finance : John Kenneth Galbraith :Talleyrand : Oscar Wilde : Otto Von Bismarck : Keynes : George Carlin : Skeptics : Propaganda : SE quotes : Language Design and Programming Quotes : Random IT-related quotes : Somerset Maugham : Marcus Aurelius : Kurt Vonnegut : Eric Hoffer : Winston Churchill : Napoleon Bonaparte : Ambrose Bierce : Bernard Shaw : Mark Twain Quotes
Bulletin:
Vol 25, No.12 (December, 2013) Rational Fools vs. Efficient Crooks The efficient markets hypothesis : Political Skeptic Bulletin, 2013 : Unemployment Bulletin, 2010 : Vol 23, No.10 (October, 2011) An observation about corporate security departments : Slightly Skeptical Euromaydan Chronicles, June 2014 : Greenspan legacy bulletin, 2008 : Vol 25, No.10 (October, 2013) Cryptolocker Trojan (Win32/Crilock.A) : Vol 25, No.08 (August, 2013) Cloud providers as intelligence collection hubs : Financial Humor Bulletin, 2010 : Inequality Bulletin, 2009 : Financial Humor Bulletin, 2008 : Copyleft Problems Bulletin, 2004 : Financial Humor Bulletin, 2011 : Energy Bulletin, 2010 : Malware Protection Bulletin, 2010 : Vol 26, No.1 (January, 2013) Object-Oriented Cult : Political Skeptic Bulletin, 2011 : Vol 23, No.11 (November, 2011) Softpanorama classification of sysadmin horror stories : Vol 25, No.05 (May, 2013) Corporate bullshit as a communication method : Vol 25, No.06 (June, 2013) A Note on the Relationship of Brooks Law and Conway Law
History:
Fifty glorious years (1950-2000): the triumph of the US computer engineering : Donald Knuth : TAoCP and its Influence of Computer Science : Richard Stallman : Linus Torvalds : Larry Wall : John K. Ousterhout : CTSS : Multix OS Unix History : Unix shell history : VI editor : History of pipes concept : Solaris : MS DOS : Programming Languages History : PL/1 : Simula 67 : C : History of GCC development : Scripting Languages : Perl history : OS History : Mail : DNS : SSH : CPU Instruction Sets : SPARC systems 1987-2006 : Norton Commander : Norton Utilities : Norton Ghost : Frontpage history : Malware Defense History : GNU Screen : OSS early history
Classic books:
The Peter Principle : Parkinson Law : 1984 : The Mythical Man-Month : How to Solve It by George Polya : The Art of Computer Programming : The Elements of Programming Style : The Unix Haters Handbook : The Jargon file : The True Believer : Programming Pearls : The Good Soldier Svejk : The Power Elite
Most popular humor pages:
Manifest of the Softpanorama IT Slacker Society : Ten Commandments of the IT Slackers Society : Computer Humor Collection : BSD Logo Story : The Cuckoo's Egg : IT Slang : C++ Humor : ARE YOU A BBS ADDICT? : The Perl Purity Test : Object oriented programmers of all nations : Financial Humor : Financial Humor Bulletin, 2008 : Financial Humor Bulletin, 2010 : The Most Comprehensive Collection of Editor-related Humor : Programming Language Humor : Goldman Sachs related humor : Greenspan humor : C Humor : Scripting Humor : Real Programmers Humor : Web Humor : GPL-related Humor : OFM Humor : Politically Incorrect Humor : IDS Humor : "Linux Sucks" Humor : Russian Musical Humor : Best Russian Programmer Humor : Microsoft plans to buy Catholic Church : Richard Stallman Related Humor : Admin Humor : Perl-related Humor : Linus Torvalds Related humor : PseudoScience Related Humor : Networking Humor : Shell Humor : Financial Humor Bulletin, 2011 : Financial Humor Bulletin, 2012 : Financial Humor Bulletin, 2013 : Java Humor : Software Engineering Humor : Sun Solaris Related Humor : Education Humor : IBM Humor : Assembler-related Humor : VIM Humor : Computer Viruses Humor : Bright tomorrow is rescheduled to a day after tomorrow : Classic Computer Humor
The Last but not Least Technology is dominated by two types of people: those who understand what they do not manage and those who manage what they do not understand ~Archibald Putt. Ph.D
Copyright © 1996-2021 by Softpanorama Society. www.softpanorama.org was initially created as a service to the (now defunct) UN Sustainable Development Networking Programme (SDNP) without any remuneration. This document is an industrial compilation designed and created exclusively for educational use and is distributed under the Softpanorama Content License. Original materials copyright belong to respective owners. Quotes are made for educational purposes only in compliance with the fair use doctrine.
FAIR USE NOTICE This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to advance understanding of computer science, IT technology, economic, scientific, and social issues. We believe this constitutes a 'fair use' of any such copyrighted material as provided by section 107 of the US Copyright Law according to which such material can be distributed without profit exclusively for research and educational purposes.
This is a Spartan WHYFF (We Help You For Free) site written by people for whom English is not a native language. Grammar and spelling errors should be expected. The site contain some broken links as it develops like a living tree...
|
You can use PayPal to to buy a cup of coffee for authors of this site |
Disclaimer:
The statements, views and opinions presented on this web page are those of the author (or referenced source) and are not endorsed by, nor do they necessarily reflect, the opinions of the Softpanorama society. We do not warrant the correctness of the information provided or its fitness for any purpose. The site uses AdSense so you need to be aware of Google privacy policy. You you do not want to be tracked by Google please disable Javascript for this site. This site is perfectly usable without Javascript.
Last modified: March 12, 2019