03-28-2014
If you're concerned he's getting into your computer, take it off the internet.
Those lines don't look suspicious to me, honestly.
9 More Discussions You Might Find Interesting
1. IP Networking
/* Linux Slackware */
looking in my logs I see tons of entries similar to below. Does anyone know what these mean, and should I be concerned. I looked up a few of the IP's at Arin.net and saw that many of them belong to isp's (not good).. Any information is helpful..
Body of Messages log... (1 Reply)
Discussion started by: LowOrderBit
1 Replies
2. Programming
Hi all!
Is there any function to get the name from a computer by the IP adresse?
Thank you in advance!
Greetings Mario (2 Replies)
Discussion started by: coredump2003
2 Replies
3. Shell Programming and Scripting
Hey, this time, I want my rhythmbox to play a different playlist at a set time (about sleeping time). my shellcode works, since if i run it it works, but when i make crontab run it, nothing happens. I try appending commands to the code, such as cp a file, and that occurs, so I have no idea what is... (1 Reply)
Discussion started by: davidY
1 Replies
4. OS X (Apple)
I am trying to change my computer name (located in system prefs-> sharing) using unix
i've tried
Macbook-Pro:~ user$ hostname
Macbook-Pro.local
Macbook-Pro:~ user$ sudo hostname hello
Password:
Macbook-Pro:~ user$ hostname
hello
It seems to work, but my computer is still called... (2 Replies)
Discussion started by: CBarraford
2 Replies
5. UNIX for Dummies Questions & Answers
I have a SCO UNIX 5.0.6. and a computer ATX.
My Question is:
How can i to power off my computer without to push the power button? :confused:
Please help me. :(
Thanks :) (11 Replies)
Discussion started by: vhabalos
11 Replies
6. UNIX for Advanced & Expert Users
Does anyone know of a way of identifying the PC / client name rather than IP address via who or some other AIX command (5.3). (4 Replies)
Discussion started by: gefa
4 Replies
7. What is on Your Mind?
Hey, the What Do You Do for a Living thread got me thinking about this.
My first "computer" was a Timex Sinclair that I built from a kit. I also spent many hours painstakingly programming a Commodore Vic20 to display graphics and sound (and save them on that slooooow tape drive). My first "real"... (26 Replies)
Discussion started by: dday
26 Replies
8. Windows & DOS: Issues & Discussions
I currently own a macbook which I am happy with. I will be starting CS coursework in august, is it ok to buy a netbook just for programming purposes. The largest file would be the compiler; I do not see the actual programs taking up that much space. Thanks. (4 Replies)
Discussion started by: N-Training
4 Replies
9. Cybersecurity
Hi,
I want to ask something about server that has been compromised. Recently, one of my VPS server has been hacked and the attacker install somekind like "IRC" script.
Everytime I killed the process or close the port, it can open again .. and again ..I'm sure the attacker has installed... (14 Replies)
Discussion started by: franx47
14 Replies
LEARN ABOUT DEBIAN
theft-server
THEFT-SERVER(1p) User Contributed Perl Documentation THEFT-SERVER(1p)
NAME
theft-server - CLC-INTERCAL networking
SYNOPSIS
theft-server --port=port [options]
DESCRIPTION
The theft-server mediates the communication between two CLC-INTERCAL programs with the internet extension. It keeps a list of process IDs
running on the current computer so it can provide lists of processes which can be engaged in INTERcal NETworking; it also responds to
broadcasts allowing other CLC-INTERCAL programs on the LAN to know there is something happening on this computer.
Under normal conditions, the theft-server is started automatically by a CLC-INTERCAL programs with the internet extension (unless one is
already running, of course!) because the extension cannot operate without a server on the local computer. However, it is possible to start
one manually, for example from a /etc/init.d or /etc/rc.d.
If the program is started automatically, it uses defaults for all its configuration; when started manually, it accepts the following
options:
-pport / --port=port
Uses the given port (number or service name) for communications, instead of using the default one from a configuration file.
-lseconds / --linger=seconds
Waits the specified time for a connection, then exit. The default is 600 (10 minutes). The timeout applies when the program starts and
also when all existing connections are closed. This allows the program to be started on demand by CLC-INTERCAL programs, and to auto-
matically exit when no longer required (unless more programs start up during the timeout).
This function is disabled by setting the timeout to 0 (i.e. -l0); for example, if starting the server from /etc/init.d or equivalent
one would disable the timeout.
-d / --debug
Tells everything it's doing (on Standard Error). Also, prevents the program from detaching from the current terminal and going into the
background.
BUGS
IPv6 is not yet implemented.
perl v5.8.8 2008-03-29 THEFT-SERVER(1p)