08-29-2002
The problem I've seen at many businesses is that these curious user do download stuff a lot - and not always from reputable sites. If you have a user that likes to download (take advantage of his/her "free" bandwidth for music / programs, etc), then there's a good chance that they're running non-company-authorized applications.
8 More Discussions You Might Find Interesting
1. Cybersecurity
I am fed up of getting viruses on my computer.
They come from other computers on the network and I'm fed up with them.
Can anyone reccomend some virus scanning software or something that I can use to prevent my machine from getting viruses?
Thanks (3 Replies)
Discussion started by: jacx2
3 Replies
2. Windows & DOS: Issues & Discussions
I had just recently experienced, a bad experience... Apperently, a worm got into my computer a created itself in my MS-DOS. No serious damage was done, but I did a little study on it, through my computer. The virus got thought my scan, by coding itself as an HTML file. Don't know why it did that,... (2 Replies)
Discussion started by: hdk_mkr
2 Replies
3. Post Here to Contact Site Administrators and Moderators
I downloaded the terminal client on my sidekick one and I am trying to figure out what is the right host to log in to unix,in order to use its feature. (0 Replies)
Discussion started by: elwil
0 Replies
4. UNIX for Dummies Questions & Answers
Can anyone explain why generally there are no viruses in Unix.
Do any of the big Anti Virus supplier produce anything for Unix platforms ? (1 Reply)
Discussion started by: jimthompson
1 Replies
5. Solaris
I know that UNIX is almost untouchable but my server is slower than previous days .
I found out that some users have watched porn on net , could they compromised system security .
So I have 2 questions
1. Has on market any viruses for Solaris
2. How to block some internet sites under... (1 Reply)
Discussion started by: solaris_user
1 Replies
6. Linux
hi guys,
I am new to linux. I want to install it on my home computer. I have a few questions.
1) if an exploit is found on linux, how long is it before it gets patched up? My worry is that because there are not many linux users, if a big is found, then it will be a long time before others... (4 Replies)
Discussion started by: JamesByars
4 Replies
7. Shell Programming and Scripting
Hello
I ask you how to make a
Anti-malicious files and viruses
Or if one of you a small example of the work on the same place and I hope my request
I want a small patch or the process of examination Virus
http://www.google.jo/images/cleardot.gif
---------- Post updated... (1 Reply)
Discussion started by: x-zer0
1 Replies
8. UNIX for Dummies Questions & Answers
Can I download Debian or SUSE for free? If so, from where on the internet can I get a free version of Unix? (3 Replies)
Discussion started by: jsb1022
3 Replies
LEARN ABOUT DEBIAN
trickled
TRICKLED(8) BSD System Manager's Manual TRICKLED(8)
NAME
trickled -- userspace bandwidth manager daemon
SYNOPSIS
trickled [-h] [-v] [-V] [-f] [-s] [-d rate] [-u rate] [-t seconds] [-l length] [-p priority] [-c file] [-n path] [-N seconds] [-w size]
DESCRIPTION
trickled is a userspace bandwidth manager daemon. trickled manages several trickle(1) sessions at a time, shaping across multiple sessions.
The options are as follows:
-v Increases the verbosity level (can be specified multiple times).
-V Prints version.
-f Runs trickled in the foreground.
-s Uses syslog for all output (instead of stderr).
-d rate Limit the download bandwidth consumption to rate KB/s.
-u rate Limit the upload bandwidth consumption to rate KB/s.
-t seconds Set smoothing time to seconds s. The smoothing time determines with what intervals trickled will try to let the application
transceive data. Smaller values will result in a more continuous (smooth) session, while larger values may produce bursts in
the sending and receiving data. Smaller values (0.1 - 1 s) are ideal for interactive applications while slightly larger values
(1 - 10 s) are better for applications that need bulk transfer. This parameter is customizable on a per-application basis via
trickled.conf(5). The default value is 5 s.
-l length Set smoothing length to length KB. The smoothing length is a fallback of the smoothing time. If trickled cannot meet the
requested smoothing time, it will instead fall back on sending length KB of data. The default value is 10 KB.
-p priority Set default priority to priority.
-c file Use the configuration file file. This file must be of the format documented in trickled.conf(5).
-n path Set socket name to path. By default, trickled uses /tmp/.trickled.sock.
-N seconds Notifies user of total bandwidth consumption every seconds s.
-w size Set peak detection window size to size KB. This determines how aggressive trickled is at eliminating bandwidth consumption
peaks. Lower values will be more aggressive, but may also result in over shaping. The default value (512 KB) is usually suffi-
cient.
EXAMPLES
trickled -u 10 -d 20
Limit aggregate trickle(1) upload bandwidth consumption to 10 KB/s and download consumption to 20 KB/s.
SEE ALSO
trickle(1), trickled.conf(5), syslog(3), netintro(4)
AUTHORS
trickled has been developed by Marius Aamodt Eriksen <marius@monkey.org>.
BSD
February 27, 2003 BSD