To discover the identity of the process sending unknown traffic on eth0, it 
was suggested that I run tcpflow.  The result and another question follows:

[EMAIL PROTECTED]:/home/tilleyrw/tcpflow-dumps# ls -S
065.032.005.052.00110-192.168.001.103.33847
065.032.005.052.00110-192.168.001.103.33846
192.168.001.103.33846-065.032.005.052.00110
192.168.001.103.33847-065.032.005.052.00110

Now that I know the specifics of From and To about the traffic, how does that 
help me in terms of identifying the offending process IDs?
-- 
Let not the sands of time get in your lunch.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to