Networking :: Get Usage's Bytes Of A Specific IP?
Sep 14, 2010I need to get usage's bytes of a specific (src/dst)IP adress;can i use this
#iptables -L -n -v -x
with the other options that get only byte of the specific IP address?
I need to get usage's bytes of a specific (src/dst)IP adress;can i use this
#iptables -L -n -v -x
with the other options that get only byte of the specific IP address?
I lost an important file. I know what bytes the file begins with. How can I search the partition for the sequence of bytes?
View 4 Replies View RelatedI currently have two internet interfaces installed, one is ethernet (eth0) and the second is wireless (wlan0). Many command line applications allow you to specify which interface should be used, but many gui apps don't provide this option or at least I haven't found it. I have some questions:
1. How would I tell Firefox to use only my wlan0 interface? If it's possible in Firefox, is this also possible with Google Chrome?
2. If a program doesn't provide a command line argument to support this, is there a standalone application that could help manage preferences for multiple applications?
I recently had to move to a new machine, everything went well except for one thing. I did fresh installation of LAMP server all with default configs. Every time I'm using PHP script to that invokes include, require or require_once I get the following error:
Code: Fatal error: Allowed memory size of 20971520 bytes exhausted (tried to allocate 7680 bytes) in /var/www/index.php on line 2 index.php file: PHP Code:
<?php include "index.php";?>
icukapi.php file:
PHP Code:
<?php echo "test";?>
My memory_limit in php.ini is set to 20M. I tried to increase that however it didn't quite work. PHP seems to allocate all possible space and return that message every time i try. If somebody has an idea of how to fix it I would be more than grateful. I spend quite a long time searching for an answer however the all things i found suggested increating memory_limit which in this case doesn't work.
I've written a program for a class that my professor will be testing in various low memory environments to see how it behaves when the program runs out of memory. Is there a way I can simulate the execution in a low memory environment without creating a virtual machine?
View 1 Replies View RelatedIs there a command to check specific processes that's using the most IO/disk usage? I know sar and ps but I want more specific details on IO on individual processes
View 5 Replies View RelatedI was trying to get the status of memory usage and disk usage using sigar in windows and ubuntu. done this in windows by just copying the sigar library into jdk library. But i was unable to do so in ubuntu. I've copied the library to java-6-sun library but still can't run the program.
View 14 Replies View RelatedI'm running into a problem where my system is running out of disk space on the root partition, but I can't figure out where the runaway usage is. I've had a stable system for a couple of years now, and it just ran out of space. I cleaned some files up to get the system workable again, but can't find the big usage area, and I'm getting conflicting results.For example, when I do a df it says I'm using 44GB out of 58 GB:
Code:
[root@Zion ~]# df -h
Filesystem Size Used Avail Use% Mounted on
[code]....
Is there any way to monitor one process' CPU usage and RAM usage over time on Linux? I am trying to change to a cheaper VPS and need to work out what level of CPU and RAM I need!
View 2 Replies View RelatedI have two pcs connected through wifi in p2p mode...I would like to see the cpu usage of the network. Could anyone help me with tools I may use for seeing cpu usage in this network.
View 3 Replies View RelatedI have installed oracle enterprise Linux in my desktop.It is the free download from Sergio's blog(in 6 CD)Now i need to work with the yum in oel5 for installing packages and also i need to install the necessary packages in my client another system both are in a network.
View 2 Replies View RelatedHow do I give permission to a logged in user to stop/start a specific service without entering a root/sudo password? So they can do a simple "service SomeService stop|start" It is for a headless Ubuntu server.
View 5 Replies View RelatedI am a brand new member
here is my question :
in a RedHat configuration :
i need to be sure that a partition has been formatted with those parameters code...
I need to search a bunch of files in a specific folder for a specific number and add all the numbers together to a total sum. I use Rsync everyday, everytime I run rsync i get a logfile (rsync output) witch contains the textstring "Total bytes sent: xxxxxx".
The "xxxxx" can vary in lenght. I need to extract the "xxxxxx" from each file and add the numbers together to a total size over a week or a month. Is this possible? And I wish to only use bash. One way of doing stuff at a time my friends .
my system I want user1 and only user1 to be able to mount and unmount a specific partition, this partition contains backups and is usually mounted read only, needs to be temporarily mounted read/write by user1 while doing the backup.user1 is an unprivileged user. I've read that the user option will let any user mount the file-system (and only that user can then subsequently unmount it) and that the users option allows any user to mount or unmount the file-system.I also found this in mount's man pageQuote:The owner option is similar to the user option, with the restriction that the user must be the owner of the special file. This may be useful e.g. for /dev/fd if a login script makes the console user owner of this device. The group option is similar, with the restriction that the user must be member of the group of the special file.So it looks like I'd need a login script for that user to make the user owner of the device file (/dev/voiceserv/backup in this case)
View 7 Replies View Relatedfor example
else {
for fileDOC in $location/*.doc
do
[code]...
I'm trying to configure our mail server to block email from a specific sender reaching a specific recipient. In other words, if one of our employees is getting harassed by a 'stalker', how would one go about blocking, at the MTA (Sendmail) level, a specific sender email address from reaching a particular users inbox? We do not want to capture the email - simply block it before it consumes server resources.The Sendmail server (MTA) is a front end to our Exchange server so no user accounts exist on the Linux server. We simply use it as a SPAM and Virus scanner then forward clean email to the Exchange server.
View 6 Replies View Relatedrecently my server become a little slow and lazy, so I started a small investigation what's going on and found out, that there is some problem with network.All processes which uses network are able to use 99% of CPU time when they got any requests. First time i thought it's only a bad configured Apache but after some research I found even FTP or SSH does it if they have to do something more (for example getting data to another server using rsync).So far I wasn't able to find a cause of this. No new software installed, only updated every few days. I have another server which have the same config, same software, same hardware and is updated in same days. But this one works without any problem. I think it's probably hardware (LAN) leaving me to it's creator. Is there some way how can I test if it's really LAN or just something bad happened to the system?
Also there is another issue - maximum speed dropped down to 20-30kB/s for both download or upload.It's Debian Lenny 2.6.22-6 if you need to know.
I am writing an application using libnetfilter_queue that should perform the following function- Receives packets from NFQUEUE- Apply a decryption algorithm to packets- Issue an ACCEPT verdict for decrypted packetsThese packets are destined to another box behind the firewall running the above mentioned application.Based on Fig 14-1 from the link belowI intend on siphoning out network packets at the PREROUTING chain of the Mangle table by usingiptables -t mangle -A PREROUTING -i eth0 -p 1234 -j NFQUEUE1) I would like to know if the PREROUTING chain in the mangle table is an appropriate place to pick off the encrypted packets ?2) Once the ACCEPT verdict is issued will the modified packets resume processing along the PREROUTING chain of the mangle table ?3) Is there a well documented reference for API's that i will need to use while developing this application ?
View 1 Replies View RelatedI have just created a usb boot disk so that I can install Fedora 14.I used the following which was successfully. However, I am left wondering what does the bs parameter actually does. I know it mean bytes and copies these at a time. But how do I know what to set it to?dd if=F14-Live-i686.iso of=/dev/sdb bs=8MIn the above example it is set to 8MB. However could I set this to any value that I want?
View 1 Replies View RelatedHow do fix my Swap Partition? Last night I added unused space to the main Ubuntu partition. Now I noticed the Swap Partition is always at 0 bytes. I'm using a Sony Laptop, and have enclosed two screenshots. One of the Disk Utility and a system monitor.
View 9 Replies View RelatedHow do i fill a file with <n> bytes at a given value ,for example 3?
View 3 Replies View RelatedI am sure that all of us know the result of top command in linux. i want to get the value that the top command return as CPU usage, memory usage. so how do i do(programming relation)?
View 3 Replies View RelatedI want to replace specific character in a file after every specific line. example as follows.
O 000000000000000000
A 111111111111111111
C 222222222222222222
[code]...
I now have a 10 GB cap on my Internet and would like a meter to tell me how much I use in a month , my IP address changes if that matters gnome ,lucid lynx
View 2 Replies View RelatedSince this is my number 1 place for asking questions, I figured I would go here first. So I live in New Zealand where good internet doesn't exist yet, and I'm in a flat with 3 other people and we get 40gb a month which hasn't been lasting more than 2 weeks. It is somewhat of a mystery where all our data has gone, so I need a way to monitor usage. We use a variety of operating systems including linux, xp & windows 7 on my pc, and xbox 360. Is there any kind of integrated solution I can use to monitor everything with password protection so it can't be disabled? I have tried looking in the router, but it doesn't give me many statistics, and I think it combines lan with wan usage. At this stage I don't have the money to make a linux box to put between the router and the switch that can monitor everything, but if it comes to it, I will shell out for one.
View 3 Replies View RelatedI have a server rack that I lease out to others. I need a way to monitor each persons bandwidth usage. How can I do this without installing software on their machines or disrupting traffic flow? I have no access to the router, as it is owned by the colo company. I do have access to the switch and firewall, as well as my machines (linux) on the rack.
View 2 Replies View RelatedA small "mom and pop" WISP would like to provide account usage information to customers.Basically, when a person connecting to the WISP's web site is a customer with an IP address from within the WISP's subnets, a link would appear on the web page where customers could read total bandwidth usage (daily, weekly, monthly, and yearly totals and averages) and public IP address. Information could include the top five bandwidth URLs visited; graphs or charts of usage; and usage during specific periods, such as business hours (8AM-5PM), evening hours (5PM-10PM), night (10PM-8AM), and weekends (10PM Friday-8AM Monday).
The WISP has installed cricket (http://cricket.sourceforge.net) and rrdtool (http://oss.oetiker.ch/rrdtool). The next trick is to grab and format the data for customers.I'm not looking for answers like "look at xyz package." Helpful responses will include a rudimentary outline to solve the problem. That is, "xyz package" might indeed be what the WISP needs, but some guidance how to use xyz is needed to move down the road.I have no experience with this type of thing. I appreciate responses from people who are experienced.
I'm diagnosing why my application is slow and I found the problem by writing a simple TCP client/server, where each side sends/receives 64k at a time. The bottleneck is on the receiving end, which uses has a Realtek 8139 100Mbit/s NIC and running Windows 7. I'm able to get 11.9 MiB/s as expected, but the CPU usage is very high - 80% on 0th CPU and ~20% on 1st CPU. Task manager shows conhost.exe taking 25% CPU and 10% for my program.
When I try the same receiving program on Debian, I can still get 11.9 MiB/s, but the CPU usage is now only 1% (user & system). On the sending side, the CPU usage is practically 0% in both Windows 7 and Debian.
I tried changing the TCP receive/send buffer sizes and disabled internet connection sharing (does extra packet processing?) on the receiving end,
I was wondering how do you slap a packet analyzer like Wireshark somewhere between all the computers in a house and the router, so you can tell what websites are being accessed? I mean websites, specifically. I'm not trying to monitor bittorrent, IRC or other things yet - I'll get to that later. I just want to break this insanely complex task into smaller bites for now.Also, since my ISP has bandwidth caps but does not have a means for consumers to monitor total network usage, I'd like to figure out how to use Wireshark to do that as well. This, I am assuming, is easier when wireshark is running on the pipeline going into the router.
View 6 Replies View Related