07-21-2012
This type of message also happens when one or more hosts on network makes a call to a Google API without properly registering and using the required Google API key, improperly configures the API call, or other actions that Google considers a violation of their API terms and conditions.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
there are commands to monitor the memory, paging, io... how about network traffic. i mean commands to see whether the network traffic (LAN) is congested? the closest i got is netstat
thanks (6 Replies)
Discussion started by: yls177
6 Replies
2. Cybersecurity
Hi,
Can someone give me the clue on how to capture network traffic at gateway.
Thanx (2 Replies)
Discussion started by: kayode
2 Replies
3. UNIX for Dummies Questions & Answers
I am interested in booting up my unix computer by connecting an external SCSI drive( intergraph) to it. The unix box is also an intergraph computer. Whenever I boot it, it gives me an error that says Drive not ready, Insert Boot Diskette in A. What am I doing wrong?
Any input would be... (3 Replies)
Discussion started by: teruotor
3 Replies
4. Cybersecurity
Anyone else seeing this error on every search result on Google today:
This site may harm your computer.
Which links to this page:
Malware Warning
Which says: (10 Replies)
Discussion started by: Neo
10 Replies
5. Infrastructure Monitoring
Hi all,
Got a strange one here, well not so much strange, different :-)
I need to work out if a server is particulary chatty, whether its talking / communicating heavily to a particular server, as Im planning to physically move the server to a different server, over a link. Hence the... (6 Replies)
Discussion started by: sbk1972
6 Replies
6. HP-UX
I Colleagues,
Somebody can say me how to monitoring traffic in the network. also I am interested in monitoring memory. if somebody to know a guide with command advanced in unix welcome for me.
Thank you for adcanced. (0 Replies)
Discussion started by: systemoper
0 Replies
7. UNIX for Advanced & Expert Users
Hi,
I have installed RHEL4 using vmware workstation..
Host OS: Windows XP
Guest OS: RHEL4
Pls refer step 17 & 18 in below link...
ORACLE-BASE - Red Hat Enterprise Linux 4 and Centos 4 Installation
1) If i choose to assign IP automatically (using DHCP) means, i am able to connect RHEL4... (3 Replies)
Discussion started by: thomasraj87
3 Replies
8. Infrastructure Monitoring
If I would like to know what connection , data , traffic in a network port ( eth0 ) , what can I do ?
ps. because I always found the network is very slow , so I would like what the network port is doing .
Thanks
Login ID ust3 is currently in read-only mode for multiple infractions. Creating... (0 Replies)
Discussion started by: ust03
0 Replies
9. UNIX for Advanced & Expert Users
Hi All
I am resilience testing an application that is spread across multiple servers.
One thing I will need to do soon is throttle the network traffic for specific interfaces within the test cluster. Specifically, maybe make a connection take twice or three times as long to respond....
I... (3 Replies)
Discussion started by: bbq
3 Replies
10. IP Networking
My son does homework on a school laptop. I was thinking about setting up a gateway on my home network, so that I can monitor web traffic and know if he is doing his homework without standing over his shoulder. Ideally I would like to use the Raspberry Pi Model b that I already have. However, I... (15 Replies)
Discussion started by: gandolf989
15 Replies
LEARN ABOUT DEBIAN
theft-server
THEFT-SERVER(1p) User Contributed Perl Documentation THEFT-SERVER(1p)
NAME
theft-server - CLC-INTERCAL networking
SYNOPSIS
theft-server --port=port [options]
DESCRIPTION
The theft-server mediates the communication between two CLC-INTERCAL programs with the internet extension. It keeps a list of process IDs
running on the current computer so it can provide lists of processes which can be engaged in INTERcal NETworking; it also responds to
broadcasts allowing other CLC-INTERCAL programs on the LAN to know there is something happening on this computer.
Under normal conditions, the theft-server is started automatically by a CLC-INTERCAL programs with the internet extension (unless one is
already running, of course!) because the extension cannot operate without a server on the local computer. However, it is possible to start
one manually, for example from a /etc/init.d or /etc/rc.d.
If the program is started automatically, it uses defaults for all its configuration; when started manually, it accepts the following
options:
-pport / --port=port
Uses the given port (number or service name) for communications, instead of using the default one from a configuration file.
-lseconds / --linger=seconds
Waits the specified time for a connection, then exit. The default is 600 (10 minutes). The timeout applies when the program starts and
also when all existing connections are closed. This allows the program to be started on demand by CLC-INTERCAL programs, and to auto-
matically exit when no longer required (unless more programs start up during the timeout).
This function is disabled by setting the timeout to 0 (i.e. -l0); for example, if starting the server from /etc/init.d or equivalent
one would disable the timeout.
-d / --debug
Tells everything it's doing (on Standard Error). Also, prevents the program from detaching from the current terminal and going into the
background.
BUGS
IPv6 is not yet implemented.
perl v5.8.8 2008-03-29 THEFT-SERVER(1p)