Sponsored Content
Full Discussion: ping from public IP
Special Forums IP Networking ping from public IP Post 302515609 by DGPickett on Wednesday 20th of April 2011 01:46:25 PM
Old 04-20-2011
netstat -rn
 

8 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

What are public keys in ssh and how do we create the public keys??

Hi All, I am having knowledge on some basics of ssh and wanted to know what are the public keys and how can we create and implement it in connecting server. Please provide the information for the above, it would be helpful for me. Thanks, Ravindra (1 Reply)
Discussion started by: ravi3cha
1 Replies

2. IP Networking

Public IP

I guys, I have a compute at home and I want access it from outside with a public IP, and the problem is that my ISP distributed private IP addresses and to access the Internet is through NAT and. I want to access that computer via SSH from other network, how can I do that? (1 Reply)
Discussion started by: pharaoh
1 Replies

3. Shell Programming and Scripting

Finding my public IP

Hi I do use this line to find my public IP. Is there other way I can do this? Maybe create the script some shorter? wget -q -O - http://minip.no | grep "<b>" | head -n1 | cut -d'<' -f3 | cut -d'>' -f2 Thanks (1 Reply)
Discussion started by: Jotne
1 Replies

4. Shell Programming and Scripting

Animation Ping on Solaris Like Cisco Ping

Hi, I develop simple animation ping script on Solaris Platform. It is like Cisco ping. Examples and source code are below. bash-3.00$ gokcell 152.155.180.8 30 Sending 30 Ping Packets to 152.155.180.8 !!!!!!!!!!!!!.!!!!!!!!!!!!!!!. % 93.33 success... % 6.66 packet loss...... (1 Reply)
Discussion started by: gokcell
1 Replies

5. Shell Programming and Scripting

How to get reason for ping failure using perls Net::Ping->new("icmp");?

Hi I am using perl to ping a list of nodes - with script below : $p = Net::Ping->new("icmp"); if ($p->ping($host,1)){ print "$host is alive.\n"; } else { print "$host is unreacheable.\n"; } $p->close();... (4 Replies)
Discussion started by: tavanagh
4 Replies

6. What is on Your Mind?

A public thank you...

AudioScope.sh has now had 2 votes of 5 stars. It has also been thanked in the latest upload... Although I know who thanked this kids project, and I have personally thanked that person, this is a public thank you to the two anonymous people who have voted it 5 stars. Thank you. It has... (0 Replies)
Discussion started by: wisecracker
0 Replies

7. Solaris

Help with NFS public

Hi, Please help. I created a ZFS pool on Solaris 11.3 (thunder) and shared it using NFS (storage). But when I connect from my Mac without credentials I can't write to the share,I assume I have to make the share public but can't figure out the syntax,please help. Also the pool is for... (6 Replies)
Discussion started by: rthorntn
6 Replies

8. Programming

Ping test sends mail when ping fails

help with bash script! im am working on this script to make sure my server will stay online, so i made this script.. HOSTS="192.168.138.155" COUNT=4 pingtest(){ for myhost in "$@" do ping -c "$COUNT" "$myhost" &&return 1 done return 0 } if pingtest $HOSTS #100% failed... (4 Replies)
Discussion started by: mort3924
4 Replies
AA-UNCONFINED(8)                                                     AppArmor                                                     AA-UNCONFINED(8)

NAME
aa-unconfined - output a list of processes with tcp or udp ports that do not have AppArmor profiles loaded SYNOPSIS
aa-unconfined DESCRIPTION
aa-unconfined will use netstat(8) to determine which processes have open network sockets and do not have AppArmor profiles loaded into the kernel. BUGS
aa-unconfined must be run as root to retrieve the process executable link from the /proc filesystem. This program is susceptible to race conditions of several flavours: an unlinked executable will be mishandled; an executable started before a AppArmor profile is loaded will not appear in the output, despite running without confinement; a process that dies between the netstat(8) and further checks will be mishandled. This program only lists processes using TCP and UDP. In short, this program is unsuitable for forensics use and is provided only as an aid to profiling all network-accessible processes in the lab. If you find any bugs, please report them at <http://https://bugs.launchpad.net/apparmor/+filebug>. SEE ALSO
netstat(8), apparmor(7), apparmor.d(5), aa_change_hat(2), and <http://wiki.apparmor.net>. AppArmor 2.7.103 2012-06-28 AA-UNCONFINED(8)
All times are GMT -4. The time now is 09:18 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy