05-17-2017
Also, one of Robert Grossblatt's famous laws of life and design: "If you can't afford to blow it up, you can't afford to use it."
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
there are commands to monitor the memory, paging, io... how about network traffic. i mean commands to see whether the network traffic (LAN) is congested? the closest i got is netstat
thanks (6 Replies)
Discussion started by: yls177
6 Replies
2. Cybersecurity
Hi,
Can someone give me the clue on how to capture network traffic at gateway.
Thanx (2 Replies)
Discussion started by: kayode
2 Replies
3. Programming
I am developing a Network Appliation to monitor computers in a network.
Specs are
App monitors the current web page viewed in each system
App also can shutdown the computer in the network
App can show all process run by each computer in the network
I am now confused how to start my... (2 Replies)
Discussion started by: valaparambil88
2 Replies
4. Infrastructure Monitoring
Hi all,
Got a strange one here, well not so much strange, different :-)
I need to work out if a server is particulary chatty, whether its talking / communicating heavily to a particular server, as Im planning to physically move the server to a different server, over a link. Hence the... (6 Replies)
Discussion started by: sbk1972
6 Replies
5. HP-UX
I Colleagues,
Somebody can say me how to monitoring traffic in the network. also I am interested in monitoring memory. if somebody to know a guide with command advanced in unix welcome for me.
Thank you for adcanced. (0 Replies)
Discussion started by: systemoper
0 Replies
6. Red Hat
How to monitor network device traffic using MRTG?
How can I add network devices in MRTG configuration to monitor? (2 Replies)
Discussion started by: manalisharmabe
2 Replies
7. UNIX Desktop Questions & Answers
Hello,
I am working in office, where, more than 60 clients machines (only 16 machines are on windows) are there and one server Centos Server, I have configured clients with server, so that internet will be used form only one IP. Only 1 ip is assigned, but now a days, my client machines are... (2 Replies)
Discussion started by: RedRocks!!
2 Replies
8. Infrastructure Monitoring
If I would like to know what connection , data , traffic in a network port ( eth0 ) , what can I do ?
ps. because I always found the network is very slow , so I would like what the network port is doing .
Thanks
Login ID ust3 is currently in read-only mode for multiple infractions. Creating... (0 Replies)
Discussion started by: ust03
0 Replies
9. UNIX for Advanced & Expert Users
Hi All
I am resilience testing an application that is spread across multiple servers.
One thing I will need to do soon is throttle the network traffic for specific interfaces within the test cluster. Specifically, maybe make a connection take twice or three times as long to respond....
I... (3 Replies)
Discussion started by: bbq
3 Replies
LEARN ABOUT DEBIAN
dspam_clean
dspam_clean(1) DSPAM dspam_clean(1)
NAME
dspam_clean - perform periodic maintenance of metadata
SYNOPSIS
dspam_clean [--profile=PROFILE] [-s[signature_life]] [-p[probability_life]] [-u[sl,hcl,shl,ihl]] [user1 user2 ... userN]
DESCRIPTION
dspam_clean is used to perform periodic housecleaning on DSPAM's metadata dictionary by deleting old or useless data.
OPTIONS
--profile=PROFILE
Specify a storage profile from dspam.conf. The storage profile selected will be used for all database connectivity. See dspam.conf
for more information.
-s Performs stale signature purging. If a value is specified, the default value of 14 days will be overridden. Specifying an age of 0
will delete all signatures from the user(s) processed.
-p Deletes all tokens from the target user(s) database whose probability is between 0.35 and 0.65 (fairly neutral, useless data). If a
value is specified, the default life of 30 days will be overridden. It's a good idea to use this flag once with a life of 0 days for
users after a significant amount of corpus training.
-u Deletes all unused tokens from a user's dataset. Four different life values are used:
sl Stale tokens which have not been used for a long period of time
hcl Tokens with a total hit count below 5 (which will be assigned a hapaxial value by DSPAM)
shl Tokens witha single spam hit
ihl Tokens with a single innocent hit
Ages may be overridden by specifying a format string, such as -u30,15,10,10 where each number represents the respective life. Speci-
fying a life of zero will delete all unused tokens in the category.
user1 user2 ... userN
Specify the username(s) to perform the selected maintenance operations on. If no username is specified, all users are processed.
EXIT VALUE
0 Operation was successful.
other Operation resulted in an error.
COPYRIGHT
Copyright (C) 2002-2011 DSPAM Project
All rights reserved.
For more information, see http://dspam.sourceforge.net.
SEE ALSO
dspam(1), dspam_admin(1), dspam_crc(1), dspam_dump(1), dspam_logrotate(1), dspam_merge(1), dspam_stats(1), dspam_train(1)
DSPAM
Apr 17, 2010 dspam_clean(1)