Try it with IE11, FireFox, Opera, Safari, IronWare (on Windows and/or OSX).
logout of the forum and create another (bogus) account.
Try it with this new account.
The first thing that came into my mind was, that the sniffers are installed and they are waiting for the whole world to change their passwords and sniff them all out.
@jayjay66
Do you use the "unknaszero" option ?
When the gaps occur, do the graphs have a valid timestamp and are the "Cur In:" and "Cur Out:" values just above zero ?
Do the gaps show in the graph as a gray area ?
What version of MRTG (Perl/Apache) do you use ?
I searched through the Cisco site with the keywords "EARL L3 ASIC" and came across this page:
http://www.cisco.com/en/US/products/hw/switches/ps700/products_tech_note09186a00801b42bf.shtml
Your non-fatal message is mentioned in it.
HTH
Hi Uplater,
Glad to hear the nasty file is gone.
Have you tried Knoppix to look into the file ?
You might even try an eCom LiveCD.
http://www.ecomstation.com/democd/
This upgrades you back (!?) to the marvelous world of OS/2.
You might even share the folder and let an Apple connect to it and...
Two things pop up in my mind.
1:
Get a copy of Knoppix (or any other LiveCD OS) and boot your PC with it. Connect to the appropriate harddisk and find the guilty JPEG file. Mount the harddisk in Read/Write mode and delete the file.
http://www.knopper.net/knoppix/index-en.html
2:
What do the...
I guess MRTG will do the trick nicely.
Take a look at http://www.openinnovations.com/mrtgbundle.html
Here you find a download link to the selfExtracting RAR archive.
It must unRAR into c:\ read the readme's and you have a longterm GNU/GPL utilization monitoring system.
Hi Boab1965,
Try my all time favorite website Snapfiles.com for these questions:
http://www.snapfiles.com/Freeware/network/fwnetmoni.html
(and it is freeware too!)
or comercial products:
http://www.omnipeek.com
http://www.networkinstruments.com/products/observer/suite.html
Reading this thread, I agree with BadFrog and Linney.
As a ServiceDesker I once had to reinstall a bunch of laptops with a new OS. They all had a BIOS password which was enabled by the users. Some at startup, and some by entering the BIOS. I was not able to contact all the users so I had to find...
If you are able to start a Command Prompt (DOS BOX) you might want to try the utility killCMOS, which can be found here:
http://freepctech.com/pc/002/files001.shtml
The utility does what it implies. It kills the CMOS settings in your BIOS, erasing all settings including passwords.
You end up...
Hi Dbyte,
There was a coder named Tobias Oetiker who has done the trick before.
He programmed his code in Perl.
Take a look at
http://oss.oetiker.ch/mrtg/pub/contrib/
and get the files "cammer" and "cammer.readme.txt"
Read the readme [ponder] and have fun.
The file "cammer" is the actual perl...
And if you are a lucky man you enabled SNMP on the switches and on the default gateway router.
If this is the case you can use the 'cammer' script from Tobias Oetiker. It is a Perl script. This script reads the MAC addresses from the switch and matches it with the ARP table from the default...
Hi Byrt,
I do not know the technical in's and out's of P2P, but it seems logical what you suggest. This also implies that the traffic should disappear after a while, when the P2P caches are refreshed and no usefull information (shares) is coming from your side.
Perhaps another forum reader can...
Have you tried to use a Network Packet Capture tool (Sniffer pro or Ethereal or Packetyzer) to actualy capture the data you see on the IP Address?
http://www.ethereal.com
http://www.packetyzer.com
You might want to use an Ethernet Hub to see all the traffic.
Take a look inside the packets to...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.