home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Media Share 9
/
MEDIASHARE_09.ISO
/
utility
/
tsutle22.zip
/
TSUTLE.INF
< prev
next >
Wrap
Text File
|
1993-04-12
|
9KB
|
227 lines
Mon 12-April-1993
About TSUTLE in General (All rights reserved)
=======================
This is the fifth package in my utilities series of currently six
packages. The others are TSUTIL, TSUTLB, TSUTLC, TSUTLD and TSUTLF.
This package may be used and distributed freely for NON-COMMERCIAL,
NON-INSTITUTIONAL, PRIVATE purposes, provided it is not changed in
any way. (Repacking with another method is ok, though.) For ANY
other usage, such as use in a business enterprise or a university,
contact the author for registration. Uploading to bulletin boards is
encouraged. Please do not distribute any part of this package
separately.
The programs are under development. Comments and contacts are
solicited. If you have any questions, please do not hesitate to use
electronic mail for communication.
InterNet address: ts@uwasa.fi (preferred)
Bitnet address: SALMI@FINFUN.BITNET
The author shall not be liable to the user for any direct, indirect
or consequential loss arising from the use of, or inability to use,
any program or file howsoever caused. No warranty is given that the
programs will work under all circumstances.
Timo Salmi
Professor of Accounting and Business Finance
Faculty of Accounting & Industrial Management
University of Vaasa
P.O. BOX 297, SF-65101 Vaasa, Finland
Timo Salmi UTiLities set E, release 2.2 includes the following
* * ** * * * *
utility-type programs:
TSUTLE22 Fifth set of Utilities, T.Salmi
Filename Comment
-------- --------------------------------
CLOBBER.EXE Delete files beyond undelete
CMOS.EXE Display of the CMOS information
CMOSALAR.EXE Check your PC's CMOS battery
FILE_ID.DIZ Brief characterization of TSUTLE
MSPLIT.EXE Split Unix elm email messages
PESTIKID.EXE Keep your computer to yourself
SETVIDEO.EXE Set Crt video (text) modes
TDEL.EXE Timo's safe recursive delete
TDELTEST.BAT Make a practice set for TDEL.EXE
TSPROG.INF List of PD programs from T.Salmi
TSUTLE.INF Document (a readme)
TSUTLE.NWS News announcements about tsutle
VAASA.INF Info: Finland, Vaasa, U of Vaasa
---- ------ ------ -----
0013
CLOBBER.EXE (Ver 1.0) Delete files beyond undelete
=====================
Usage: CLOBBER FileMask1 [[FileMask2]..] [/c] [/s]
set a Counter on ─┘ │
recurse into Subdirectories ─┘
CLOBBER fills files with ? and then deletes them asking for your
confirmation.
Example: CLOBBER /s c:\*.bak wipes out all *.bak files from drive C:
The purpose of clobber is to wipe files so that they cannot be
undeleted in their original format. It is an elementary computer
security program. But read the reservations in TSUTLE.NWS item Tue
6-Oct-92. Don't trust this blindly.
BE CAREFUL: Especially if you use the recursive option, first make
yourself well familiar with CLOBBER using practice data (see
TDELTEST.BAT). The idea of CLOBBER is to be safe, but as with all
sweeping delete utilities you can harm yourself if you are not very
careful with what you do. Think first!
CMOS.EXE (Ver 1.3) Display of the CMOS information
==================
Reads and displays your battery backupped system information.
Usage: CMOS [/bw]
└─ Black and White for LCD like on laptops
CMOSALAR.EXE (Ver 1.0) Check your PC's CMOS battery
======================
Usage: CMOSALAR [/b] [/h or ?]
│ └─ give help
└─ Batch mode, no header
The modern PCs have a battery backupped CMOS memory which includes
the backed-up clock to store the date and the time, and
configuration information. This battery usually lasts for several
years, but eventually it will loose power. The current (pardon the
pun) state of the battery can be checked by programming since as
long as the battery is giving power a certain bit in CMOS memory
is on, and if the battery looses power the bit will be off. This
CMOSALAR.EXE program reads the CMOS information. If the battery bit
is off, an alarm will be sounded. Likewise if the clock current-off
bit is on, the alarm will be sounded. The alarm can be turned off by
pressing any key. One option is to put this program in your
autoexec.bat where it will act as a sentinel for you.
MSPLIT.EXE (Ver 1.1) Split Unix elm email messages
====================
Usage: MSPLIT [InputFileName] [/f] [/p###] [/oDirectory] [/s]
Formfeed, not file separation ─┘ │ │ │
Page length of output ─┘ │ │
Output directory ─┘ │
Scandinavian conversion ─┘
MailSPLIT splits Unix mail that has been printed to a file. If you
read your email using elm, you can put the following definition in
the elm options submenu:
P)rint mail using : cat >> /YourDirectory/mail
This means that each message in your mail file starts by
From:
Subject:
If you transfer the mail file to your PC you can then use "MSPLIT
mail" to split the messages into mail.001, mail.002, etc when MSPLIT
encounters "From: " or "From " on at the beginning of the line, and
"Subject: " or "Return-Path: " or "Article: " or "Received: " on the
next line. If you use "MSPLIT mail /f" MSPLIT inserts a formfeed
before each message, making a single mail.001 file.
PESTIKID.EXE (Ver 1.3) Keep your computer to yourself
======================
Usage: PESTIKID ### [/a###] [/c] [/d] [/w###]
│ │ │ │ └─ one Warning word (red on blue)
│ │ │ └─ Don't restore (25x80) screen afterwards
│ │ └─ Cursor off
│ └─ Alarm cycles (0-255, default 5, use 0 for silent)
└─ Unlocking ascii code (e.g. 150)
This is a simple program for intercepting input from the keyboard to
curb unwanted access to your computer. To exit the keyboard
interception, type the unlocking ascii code. E.g. if you use 150,
then while keeping Alt down type from the numeric keypad 1 5 0, and
release Alt.
When the program is running, the Break key is inactivated, and so is
alt-ctrl-del. Thus the user must either know the unlock code or
reset the your PC physically.
SETVIDEO.EXE (ver 1.0) Set Crt video (text) modes
======================
Usage: SETVIDEO VideoModeInHex [/w]
Write a test frame ─┘
SETVIDEO sets video modes through interrupts. Since the conventions
can vary from adapter to adapter, the mode is given in hexadecimal
rather than selected from a set of preset alternatives. For a list
of the values for the different modes and adapter cards see Ralf
Brown's INTERRUP.A in INTER32A.ZIP. Look for INT 10, function ah =
00. However here are some of the text mode codes for the adapters I
have on my 386 based PCs, where $03 is my boot-time default
$00 = 40x25 $01 = 40x25 $02 = 80x25 $03 = 80x25
$50 = 80x30 $51 = 80x43 $52 = 132x25 $53 = 132x25
$54 = 132x30 $55 = 132x43 $56 = 132x60
TDEL.EXE (Ver 1.3) Timo's safe recursive delete
==================
Usage: TDEL FileMask1 [[FileMask2]..] [/c] [/d] [/f] [/s]
set a Counter on ─┘ │ │ │
Directories, not files ─┘ │ │
force Forward for directories ─┘ │
recurse into Subdirectories ─┘
TDEL deletes files and removes directories asking for your
confirmation.
Example: TDEL /s c:\*.bak deletes all *.bak files from drive C:
┌──────────────────────────────────────────────────────────────────────┐
│ Warning: If you use the recursive option, first make yourself well │
│ familiar with TDEL using practice data (see TDELTEST.BAT). The idea │
│ of TDEL is to be safe, but as with all sweeping delete utilities you │
│ can harm yourself if you are not very careful with what you do. │
└──────────────────────────────────────────────────────────────────────┘
Note that if you have several levels of subdirectories and intend to
use the /d /s switch combination, you'll first have to delete all
the files from the subdirectories with the /s switch (takes place in
one sweep).
Example: First run TDELTEST.BAT to create the test directories on
the R: drive (I always have ramdisk on R:). Thus you have the
following subdirectories:
R:\TESTDIR\SUBDIR1\LEVEL3
R:\TESTDIR\SUBDIR1
R:\TESTDIR\SUBDIR2
R:\TESTDIR
Next to delete recursively the files within the directories run
TDEL /s r:\testdir\*.*
Then to remove recursively the directories run
TDEL /d /s r:\testdir
TDEL.EXE skips read-only, hidden, and system files but it reports
them. If you wish to delete these files you must first make them
ordinary files with some standard utility. Since MsDos 5.0 the
attrib command does that but for earlier versions you have to have a
third party utilty to convert hidden and system files.
--------------------------------------------------------------------
A very elementary security puzzle to spoil your day :-).
ortva 644 pba
Z0I]A9J)N='5Y871V;ILF+"!L;J4@:ILB=E!O;J1U(')B=#$F(&%A9"!H=61R
'8I]Q92$-"O$-
`
raq