Sponsored Content
Special Forums IP Networking I would like to monitor network traffic for a computer on my network Post 302997653 by Corona688 on Wednesday 17th of May 2017 04:53:03 PM
Old 05-17-2017
Also, one of Robert Grossblatt's famous laws of life and design: "If you can't afford to blow it up, you can't afford to use it."
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

monitoring network traffic

there are commands to monitor the memory, paging, io... how about network traffic. i mean commands to see whether the network traffic (LAN) is congested? the closest i got is netstat thanks (6 Replies)
Discussion started by: yls177
6 Replies

2. Cybersecurity

How to capture network traffic

Hi, Can someone give me the clue on how to capture network traffic at gateway. Thanx (2 Replies)
Discussion started by: kayode
2 Replies

3. Programming

Help in developing a Network Appliation to monitor pc in a network

I am developing a Network Appliation to monitor computers in a network. Specs are App monitors the current web page viewed in each system App also can shutdown the computer in the network App can show all process run by each computer in the network I am now confused how to start my... (2 Replies)
Discussion started by: valaparambil88
2 Replies

4. Infrastructure Monitoring

Network Traffic

Hi all, Got a strange one here, well not so much strange, different :-) I need to work out if a server is particulary chatty, whether its talking / communicating heavily to a particular server, as Im planning to physically move the server to a different server, over a link. Hence the... (6 Replies)
Discussion started by: sbk1972
6 Replies

5. HP-UX

Monitoring traffic in the network

I Colleagues, Somebody can say me how to monitoring traffic in the network. also I am interested in monitoring memory. if somebody to know a guide with command advanced in unix welcome for me. Thank you for adcanced. (0 Replies)
Discussion started by: systemoper
0 Replies

6. Red Hat

How to monitor network device traffic using MRTG?

How to monitor network device traffic using MRTG? How can I add network devices in MRTG configuration to monitor? (2 Replies)
Discussion started by: manalisharmabe
2 Replies

7. UNIX Desktop Questions & Answers

While Connecting to Google networking. Error = Unusual traffic from your computer network.

Hello, I am working in office, where, more than 60 clients machines (only 16 machines are on windows) are there and one server Centos Server, I have configured clients with server, so that internet will be used form only one IP. Only 1 ip is assigned, but now a days, my client machines are... (2 Replies)
Discussion started by: RedRocks!!
2 Replies

8. Infrastructure Monitoring

How do I know what traffic is in network port?

If I would like to know what connection , data , traffic in a network port ( eth0 ) , what can I do ? ps. because I always found the network is very slow , so I would like what the network port is doing . Thanks Login ID ust3 is currently in read-only mode for multiple infractions. Creating... (0 Replies)
Discussion started by: ust03
0 Replies

9. UNIX for Advanced & Expert Users

How to throttle network traffic?

Hi All I am resilience testing an application that is spread across multiple servers. One thing I will need to do soon is throttle the network traffic for specific interfaces within the test cluster. Specifically, maybe make a connection take twice or three times as long to respond.... I... (3 Replies)
Discussion started by: bbq
3 Replies
dspam_clean(1)							       DSPAM							    dspam_clean(1)

NAME
dspam_clean - perform periodic maintenance of metadata SYNOPSIS
dspam_clean [--profile=PROFILE] [-s[signature_life]] [-p[probability_life]] [-u[sl,hcl,shl,ihl]] [user1 user2 ... userN] DESCRIPTION
dspam_clean is used to perform periodic housecleaning on DSPAM's metadata dictionary by deleting old or useless data. OPTIONS
--profile=PROFILE Specify a storage profile from dspam.conf. The storage profile selected will be used for all database connectivity. See dspam.conf for more information. -s Performs stale signature purging. If a value is specified, the default value of 14 days will be overridden. Specifying an age of 0 will delete all signatures from the user(s) processed. -p Deletes all tokens from the target user(s) database whose probability is between 0.35 and 0.65 (fairly neutral, useless data). If a value is specified, the default life of 30 days will be overridden. It's a good idea to use this flag once with a life of 0 days for users after a significant amount of corpus training. -u Deletes all unused tokens from a user's dataset. Four different life values are used: sl Stale tokens which have not been used for a long period of time hcl Tokens with a total hit count below 5 (which will be assigned a hapaxial value by DSPAM) shl Tokens witha single spam hit ihl Tokens with a single innocent hit Ages may be overridden by specifying a format string, such as -u30,15,10,10 where each number represents the respective life. Speci- fying a life of zero will delete all unused tokens in the category. user1 user2 ... userN Specify the username(s) to perform the selected maintenance operations on. If no username is specified, all users are processed. EXIT VALUE
0 Operation was successful. other Operation resulted in an error. COPYRIGHT
Copyright (C) 2002-2011 DSPAM Project All rights reserved. For more information, see http://dspam.sourceforge.net. SEE ALSO
dspam(1), dspam_admin(1), dspam_crc(1), dspam_dump(1), dspam_logrotate(1), dspam_merge(1), dspam_stats(1), dspam_train(1) DSPAM
Apr 17, 2010 dspam_clean(1)
All times are GMT -4. The time now is 09:46 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy