Hi Folks
I am not a c programmer .But i need help in writing a program which can do this any ideas on how to go about it .
i start a server on the target server where files need to be copied
start-server -port 5006 & ---start the server and listen it on a partcular port
on the source... (2 Replies)
I'd like to do a data transfer without encryption but with a guarantee that my data comes from a legit source. I'm thinking something that uses a public key scheme to sign the data.
Does anyone know of something like that?
Thanks!
-Pileofrogs (1 Reply)
Is there a way how to react on the message a client sent to the server?
I would like as the client sent message to server: "get information such and such" and server would answer.
Thank you for reply! (6 Replies)
Please direct me to the right forum tree if i am in the wrong section for this.
i have netcat on a unix machine and there is no man nc or man netcat available.
my command i am using is:
cat $FILE1 | netcat -h $PRINTER -p 9100
(-h -p -d are the only flags available in this version of... (3 Replies)
hello guys, i want to install netcat on my solaris. after i tar and gunzip netcat i'm confuse what do i must to do ? please help me to install netcat on my solaris. I'm beginner :( (2 Replies)
Hello,
Thank you very much for the line nc -lp <port> . I tried to run simple chat session with nc as it's shown in catonmatDOTorg but failed miserably with that syntax inspite of opening port 7777 by iptables . But your command example is working nicely.
So a bagful of thanks :))
Only one... (0 Replies)
Hi all,
I know my question is regarding Windows and not Linux, but I simply need people who know Netcat pretty well and I'm guessing here is a good place for that. So on with my question.
I'm doing some research, and I was playing around with netcat on a WinXP VM but I can't seem to get... (0 Replies)
Hi
Need help to connect from Ubuntu to Windows using NetCat nc
I can not get my script to send new-line
Her is what I have tried(sleep 2 ; echo user ; sleep 1; echo pass; sleep 2; echo netstat) | nc -t 10.10.10.34 23
gives this outputÿý%ÿûÿûÿý'ÿýÿýÿûWelcome to Microsoft Telnet Service
... (1 Reply)
Currently I run a number of network tests using netcat that checks for an open port on a remote IP-address, using this syntax:
netcat -v -w 5 -z 107.249.95.5 4488
For some reason, the netcat command above is hanging (although others work fine), but a telnet is showing a valid connection like... (4 Replies)
Dear Linux guru's
I am trying to create a webserver using nc (netcat only) on RHEL 7.2 running on bash shell.
now the easy thing is to get nc listing to a port and respond back
$ while true; do { echo -e 'HTTP/1.0 200 OK\r\n'; set; } | nc -l 7877; done
This when called from a... (3 Replies)
Discussion started by: chakrapani
3 Replies
LEARN ABOUT DEBIAN
bup-margin
bup-margin(1) General Commands Manual bup-margin(1)NAME
bup-margin - figure out your deduplication safety margin
SYNOPSIS
bup margin [options...]
DESCRIPTION
bup margin iterates through all objects in your bup repository, calculating the largest number of prefix bits shared between any two
entries. This number, n, identifies the longest subset of SHA-1 you could use and still encounter a collision between your object ids.
For example, one system that was tested had a collection of 11 million objects (70 GB), and bup margin returned 45. That means a 46-bit
hash would be sufficient to avoid all collisions among that set of objects; each object in that repository could be uniquely identified by
its first 46 bits.
The number of bits needed seems to increase by about 1 or 2 for every doubling of the number of objects. Since SHA-1 hashes have 160 bits,
that leaves 115 bits of margin. Of course, because SHA-1 hashes are essentially random, it's theoretically possible to use many more bits
with far fewer objects.
If you're paranoid about the possibility of SHA-1 collisions, you can monitor your repository by running bup margin occasionally to see if
you're getting dangerously close to 160 bits.
OPTIONS --predict
Guess the offset into each index file where a particular object will appear, and report the maximum deviation of the correct answer
from the guess. This is potentially useful for tuning an interpolation search algorithm.
--ignore-midx
don't use .midx files, use only .idx files. This is only really useful when used with --predict.
EXAMPLE
$ bup margin
Reading indexes: 100.00% (1612581/1612581), done.
40
40 matching prefix bits
1.94 bits per doubling
120 bits (61.86 doublings) remaining
4.19338e+18 times larger is possible
Everyone on earth could have 625878182 data sets
like yours, all in one repository, and we would
expect 1 object collision.
$ bup margin --predict
PackIdxList: using 1 index.
Reading indexes: 100.00% (1612581/1612581), done.
915 of 1612581 (0.057%)
SEE ALSO bup-midx(1), bup-save(1)BUP
Part of the bup(1) suite.
AUTHORS
Avery Pennarun <apenwarr@gmail.com>.
Bup unknown-bup-margin(1)