06-30-2011
Parallel Processing Detection and Program Return Value Detection
Hey, for the purpose of a research project I need to know if a specific type of parallel processing is being utilized by any user-run programs. Is there a way to detect whether a program either returns a value to another program at the end of execution, or just utilizes any form of parallel processing? This is without having access to the source code of the program. Help please.
7 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
IS there virus software for unix? I worked in a Solaris environment and dont remember having anything. I also ask because the current enviroment i am working on is Microsoft and they argue that they do not use unix because of virus detection. Any input would be greatly appreciated. (1 Reply)
Discussion started by: pbonilla
1 Replies
2. IP Networking
How to get information that where is my modem configured in /dev.
I have two modems configured in my device .. one is USB and other is PCI modem.. USB is detected as /dev/USB0. but how to see about PCI modem? (0 Replies)
Discussion started by: s123.radha
0 Replies
3. UNIX for Dummies Questions & Answers
Hi All,
could any expert tell me about writing a parallel processing program using AWK program is possible or not? Any example would be much appreciated...
With Regards / Mysore Ganapati :confused: (5 Replies)
Discussion started by: ganapati
5 Replies
4. Shell Programming and Scripting
hellou, can anybody help me with nat detection in real time ? i prefer some detection script because i try some nat detection program's for example p0f or i'm using tcpdump, but i would get contain of specific packet. Some ideas? (1 Reply)
Discussion started by: TheTechnic
1 Replies
5. AIX
Hi,
I have a handy script in Linux, part of which checks for the presence of nfs mounts, using the information in /proc/mounts.
Is there a suitable command or file in AIX that could be used in a similar way?
Many thanks in advance (1 Reply)
Discussion started by: SDG
1 Replies
6. Shell Programming and Scripting
I want to grep/awk /var/log/httpd/mysite-access_log.log and check if 2 words from the following appear in a single line:
benchmark
union
information_schema
drop
truncate
group_concat
into
file
case
hex
lpad
group
order
having
insert
union
select
from (12 Replies)
Discussion started by: koutroul
12 Replies
7. Shell Programming and Scripting
This URL:
Internet Archive Wayback Machine
..will redirect to this URL when using a browser:
https://web.archive.org/web/20140110200053/http://rapor.tuik.gov.tr/reports/rwservlet?adnksdb2&ENVID=adnksdb2Env&report=wa_idari_yapi_10sonrasi.RDF&p_il1=17&p_yil=2012&p_dil=2&desformat=html
But... (0 Replies)
Discussion started by: Mid Ocean
0 Replies
LEARN ABOUT DEBIAN
suricata
SURICATA(8) System Manager's Manual SURICATA(8)
NAME
suricata - Next Generation Intrusion Detection and Prevention Tool
SYNOPSIS
suricata [options]
DESCRIPTION
suricata is a network Intrusion Detection System (IDS). It is based on rules (and is fully compatible with snort rules) to detect a variety
of attacks / probes by searching packet content.
This new Engine supports Multi-Threading, Automatic Protocol Detection (IP, TCP, UDP, ICMP, HTTP, TLS, FTP and SMB), Gzip Decompression,
Fast IP Matching and coming soon hardware acceleration on CUDA and OpenCL GPU cards.
It supports acquiring packets through NFQUEUE, PCAP (live or offline) etc.
OPTIONS
-c config_file
Use configuration file config_file
-i interface
Sniff packets on interface.
-r file
Read the tcpdump-formatted file tcpdump-file. This will cause Suricata to read and process the file fed to it. This is useful for
offline analysis.
-q queue_id
Sniff packets sent by the kernel through NFQUEUE. This allows running Suricata in inline mode (IPS) for packets captured by iptables
using the NFQUEUE target.
-s signatures
Path to the signatures file.
-l log_dir
Path to the default log directory.
-D Run as daemon
--init-errors-fatal
Enable fatal failure on signature init error.
SEE ALSO
tcpdump(1), pcap(3).
AUTHOR
suricata was written by the Open Information Security Foundation.
This manual page was written by Pierre Chifflier <pollux@debian.org>, for the Debian project (and may be used by others).
February 2010 SURICATA(8)