As root on Linux:
In the next-to-last column look for ESTABLISHED (won't appear for UDP). The last column gives you the PID and process name. If it's empty/'-' even as root, it's probably a mount.
I'm new on UNIX and i want to display the LV NAME, LPs, PPs, DISTRIBUTION, MOUNT POINT but i don't know what is the command.
Thanks,
Regards (3 Replies)
Hi All,
I would like to monitor the volume of Data that is transferred through a single port in AIX. I have nmon installed in my machine. What is the best possible solution for this problem.
Thanks in Advance. (3 Replies)
Hi,
I have a wireless router connecting both windows and linux systems at home. I've discovered someone has been downloading illegal content on my network simply because they accidentally left the torrent downloader on their screen when showing me something. I removed their access for a few days... (1 Reply)
need perl script to get a comprehend statistic of network activity in a LAN.
The purpose is to get each indivisual data usages statistics so that I can determine who is doing the network congestion in terms of bandwidth usages both in real time and retrospectively..
Thanks in... (4 Replies)
Hello all,
Here is the explanation of my problem:
I have a cronjob that connects to a NAS to do backups from my laptop to this NAS device.
The script that I wrote does check if there is a host (the NAS) responding on 192.168.1.10 and tries to connect to it with the following command:
mount -v... (3 Replies)
I am having Red Hat Linux 5.9 installed in my server.
There are 2 physical ethernet port in the server and these 2 ports are bonded to 1 bond0 port through linux bonding utility.
For some days I am experiencing some fluctuation in server port.
I want to analyze the same.How to do that?
It may... (4 Replies)
Discussion started by: Anjan Ganguly
4 Replies
LEARN ABOUT LINUX
aa-unconfined
AA-UNCONFINED(8) AppArmor AA-UNCONFINED(8)NAME
aa-unconfined - output a list of processes with tcp or udp ports that do not have AppArmor profiles loaded
SYNOPSIS
aa-unconfined
DESCRIPTION
aa-unconfined will use netstat(8) to determine which processes have open network sockets and do not have AppArmor profiles loaded into the
kernel.
BUGS
aa-unconfined must be run as root to retrieve the process executable link from the /proc filesystem. This program is susceptible to race
conditions of several flavours: an unlinked executable will be mishandled; an executable started before a AppArmor profile is loaded will
not appear in the output, despite running without confinement; a process that dies between the netstat(8) and further checks will be
mishandled. This program only lists processes using TCP and UDP. In short, this program is unsuitable for forensics use and is provided
only as an aid to profiling all network-accessible processes in the lab.
If you find any bugs, please report them at <http://https://bugs.launchpad.net/apparmor/+filebug>.
SEE ALSO netstat(8), apparmor(7), apparmor.d(5), aa_change_hat(2), and <http://wiki.apparmor.net>.
AppArmor 2.7.103 2012-06-28 AA-UNCONFINED(8)