01-21-2015
Something is, though. That's what "promiscuous mode" means, it will receive packets to any destination. Things like wireshark and tcpdump use it to monitor the connection.
What programs / services are you running? You need to find what is putting it into that mode. Whatever it is, is what I suspect is messing up your connection.
9 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
How would you convert lets say a 1000 minutes to hours, minutes, seconds (1 Reply)
Discussion started by: Vozx
1 Replies
2. Shell Programming and Scripting
I have to check for a directory content: every time it is filled with a file, I have to launch a bash script.
So: how to do an ls every 5 minutes (avoiding cron), telling the script to start if the file has appeared in the dir?
Have you got better ideas?
Thanks in advance! (5 Replies)
Discussion started by: canduc17
5 Replies
3. Solaris
Dear all,
I am a newbie in solaris and I need your advice.
I have a Solaris version 5.9 installed on Sunfire V240.
I am able to ssh the machine from putty remotely.
My problem is that I cannot see the display from KVM switch I have connected to it. I need also to be able to see the GUI... (2 Replies)
Discussion started by: mbouster
2 Replies
4. SCO
Hi all
I have installed a demo version of SCO OpenServer 5.0.2, I finally found it is Desktop Interface, I would like to know how to change its interface to dos based interface?
If you have any ideas, please tell me then. Thank you (2 Replies)
Discussion started by: TinhNhi
2 Replies
5. IP Networking
This is my situation
DOS pc serial cable (sl0) Linux Pc eth1
192.168.0.10 <-------------------->192.168.0.2 <------------>192.168.0.1 (router)
I connected the linux pc and the dos pc with a SLIP (serial line internet protocol), so they can communicate in the sl0 interface.
... (3 Replies)
Discussion started by: mghis
3 Replies
6. UNIX for Dummies Questions & Answers
I have a RHEL 5 system with a bonded interface configure using only one network port (eth0). So I have config file for ifcfg-bond0 and ifcfg-eth. I'd like to configure eth5 to be the second SLAVE in the bond. My question is, after I modify ifcfg-eth5, can I add eth5 to the bond0 interface without... (1 Reply)
Discussion started by: westmoreland
1 Replies
7. UNIX for Beginners Questions & Answers
Hi, please help with below time conversion to minutes.
one column values:
2 minutes 16 seconds 420 msec
43 seconds 750 msec
0 days 3 hours 29 minutes 58 seconds 480 msec
11 seconds 150 msec
I need output in minutes(total elapsed time in minutes) (2 Replies)
Discussion started by: ramu.badugula
2 Replies
8. Shell Programming and Scripting
Hi all,
System Ubuntu 16.04.3 LTS
i have the following log
INFO 2019-02-07 15:13:31,099 module.py:700] default: "POST /join/8550614e-3e94-4fa5-9ab2-135eefa69c1b HTTP/1.0" 500 2042
INFO 2019-02-07 15:13:31,569 module.py:700] default: "POST /join/6cb9c452-dcb1-45f3-bcca-e33f5d450105... (15 Replies)
Discussion started by: charli1
15 Replies
9. Shell Programming and Scripting
Hello all,
Info:
System RedHat 7.5
I need to create a script that based on the creation time,
if the file is older then 5 minutes then execute some stuff, if not exit.
I thought to get the creation time and minutes like this.
CreationTime=$(stat -c %y /tmp/test.log | awk -F" " '{ print... (3 Replies)
Discussion started by: charli1
3 Replies
LEARN ABOUT DEBIAN
sc_warts2pcap
SC_WARTS2PCAP(1) BSD General Commands Manual SC_WARTS2PCAP(1)
NAME
sc_warts2pcap -- write packets included in warts object to a pcap file.
SYNOPSIS
sc_warts2pcap [-o outfile] [-s sort] [file ...]
DESCRIPTION
The sc_warts2pcap utility provides the ability to extract packets embedded in the tbit, sting, and sniff warts objects and write them to a
pcap file, which can be read by tcpdump and wireshark. The options are as follows:
-o outfile
specifies the name of the output file. If no output file is specified, it will be written to the standard output, provided that it
is not a tty.
-o sort
specifies how the pcap records (packets) are sorted before being written out. By default, no sorting is applied; the packets are
grouped as they are in the warts file. If packet sorting is specified, the packets are written out in timestamp order. Note that
this operation requires the packets to be read into memory to be sorted, so it will require a corresponding amount of memory to com-
plete.
EXAMPLES
The command:
sc_warts2pcap -o output.pcap file1.warts file2.warts
will read the packet objects from file1.warts, and then file2.warts, and write them to output.pcap.
The command:
gzcat file1.warts.gz | sc_warts2pcap -s packet >file1.pcap
will read the contents of the uncompressed warts file supplied on stdin, sort the packets by their timestamp, and then write the output to
file1.pcap.
SEE ALSO
scamper(1), tcpdump(1)
AUTHORS
sc_warts2pcap is written by Stephen Eichler and Matthew Luckie.
BSD
October 15, 2010 BSD