Sponsored Content
Full Discussion: Scan Rates
Operating Systems AIX Scan Rates Post 302307777 by seacros on Thursday 16th of April 2009 10:00:14 AM
Old 04-16-2009
I would like to know this also. Mine have not reached that high but I would like to know so i can tune my monitoring agents for my AIX servers.

SeaCros
 

6 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

IP Name scan

Hi. how to search a range of IP:s for their registed IP names? Like nslookup or host for all IPs 130.xxx.xxx.1 to 130.xxx.xxx.254 //nicke (2 Replies)
Discussion started by: nicke30
2 Replies

2. Advertise with Us

Special Discount Rates for Job Posting In Effect

The UNIX and Linux Job Board is a service provided by the The UNIX and Linux Forums to help employers connect with UNIX and Linux professionals. All proceeds from this service go towards supporting the forums. Please PM Neo or email with any questions about this service. Promotion A: $99 ... (0 Replies)
Discussion started by: Neo
0 Replies

3. Shell Programming and Scripting

FTP run from shell script gives slow transfer rates

Hey everybody, this is my first post so be gentle. I have two Sun 5220's running Solaris 10 that are directly connected with a cross-over cable at Gig. One of these boxes is my production Oracle server which generates a 50GB dump file every evening at 10:50. The other Solaris is a devolopment... (8 Replies)
Discussion started by: Countificus
8 Replies

4. What is on Your Mind?

Where to find higher consulting rates?

Have any IT consultants here been on a project where you knew the bill rate was really high but you only got a tiny piece of it (like paid $60/hr and billed out around $200)? Does anyone know of a company that pays consultants well - like 70-80% or more of what they're getting? (5 Replies)
Discussion started by: apierce
5 Replies

5. Cybersecurity

Virus/Malware Uptake Rates

Hi. I'm trying to get information about the rates at which viruses and malware infect computers. Let's say that Mr. Dastardly Developer discovers an exploitable flaw, writes a virus to take advantage of it, and releases the virus. Assuming that a large-scale attack method is chosen (Facebook,... (2 Replies)
Discussion started by: treesloth
2 Replies

6. Hardware

BackBlaze article on HDD failure rates.

Very interesting. One for the pros here... Hard Drive Failure Rates: The Results from 68,813 Hard Drives (3 Replies)
Discussion started by: wisecracker
3 Replies
IWLIST(8)						     Linux Programmer's Manual							 IWLIST(8)

NAME
iwlist - Get more detailed wireless information from a wireless interface SYNOPSIS
iwlist [interface] scanning iwlist [interface] frequency iwlist [interface] rate iwlist [interface] keys iwlist [interface] power iwlist [interface] txpower iwlist [interface] retry iwlist [interface] event iwlist [interface] auth iwlist [interface] wpakeys iwlist [interface] genie iwlist [interface] modulation iwlist --help iwlist --version DESCRIPTION
Iwlist is used to display some additional information from a wireless network interface that is not displayed by iwconfig(8). The main argument is used to select a category of information, iwlist displays in detailed form all information related to this category, including information already shown by iwconfig(8). PARAMETERS
scan[ning] Give the list of Access Points and Ad-Hoc cells in range, and optionally a whole bunch of information about them (ESSID, Quality, Frequency, Mode...). The type of information returned depends on what the card supports. Triggering scanning is a privileged operation (root only) and normal users can only read left-over scan results. By default, the way scanning is done (the scope of the scan) is dependant on the card and card settings. This command takes optional arguments, however most drivers will ignore those. The option essid is used to specify a scan on a spe- cific ESSID. With some card/driver, this enables to see hidden networks. The option last does not trigger a scan and read left-over scan results. freq[uency]/channel Give the list of available frequencies in the device and the number of defined channels. Please note that usually the driver returns the total number of channels and only the frequencies available in the present locale, so there is no one-to-one mapping between frequencies displayed and channel numbers. rate/bit[rate] List the bit-rates supported by the device. keys/enc[ryption] List the encryption key sizes supported and list all the encryption keys set in the device. power List the various Power Management attributes and modes of the device. txpower List the various Transmit Powers available on the device. retry List the transmit retry limits and retry lifetime on the device. ap/accesspoint/peers Give the list of Access Points in range, and optionally the quality of link to them. This feature is obsolete and now deprecated in favor of scanning support (above), and most drivers don't support it. Some drivers may use this command to return a specific list of Peers or Access Points, such as the list of Peers associated/regis- tered with the card. See your driver documentation for details. event List the wireless events supported by the device. auth List the WPA authentication parametes curently set. wpa[keys] List all the WPA encryption keys set in the device. genie List the Generic Information Elements set in the device (used for WPA support). modu[lation] List the modulations supported by the device and the modulations currently enabled. --version Display the version of the tools, as well as the recommended and current Wireless Extensions version for the tool and the various wireless interfaces. --help Display short help message. FILES
/proc/net/wireless SEE ALSO
iwconfig(8), iwspy(8). iwevent(8), iwpriv(8), wireless(7). wireless-tools 13 April 2006 IWLIST(8)
All times are GMT -4. The time now is 06:33 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy