When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. ifconfig - Wikipedia

    en.wikipedia.org/wiki/Ifconfig

    In macOS, the ifconfig command functions as a wrapper to the IPConfiguration agent, and can control the BootP and DHCP clients from the command-line. Use of ifconfig to modify network settings in Mac OS X is discouraged, because ifconfig operates below the level of the system frameworks which help manage network configuration.

  3. Wireless tools for Linux - Wikipedia

    en.wikipedia.org/wiki/Wireless_tools_for_Linux

    Wireless tools for Linux is a collection of user-space utilities written for Linux kernel-based operating systems to support and facilitate the configuration of device drivers of wireless network interface controllers and some related aspects of networking using the Linux Wireless Extension.

  4. Promiscuous mode - Wikipedia

    en.wikipedia.org/wiki/Promiscuous_mode

    In IEEE 802 networks such as Ethernet or IEEE 802.11, each frame includes a destination MAC address. In non-promiscuous mode, when a NIC receives a frame, it drops it unless the frame is addressed to that NIC's MAC address or is a broadcast or multicast addressed frame. In promiscuous mode, however, the NIC allows all frames through, thus ...

  5. sudo - Wikipedia

    en.wikipedia.org/wiki/Sudo

    sudo retains the user's invocation rights through a grace period (typically 5 minutes) per pseudo terminal, allowing the user to execute several successive commands as the requested user without having to provide a password again. [21] As a security and auditing feature, sudo may be configured to log each command run.

  6. Network behavior anomaly detection - Wikipedia

    en.wikipedia.org/wiki/Network_Behavior_Anomaly...

    NBAD is the continuous monitoring of a network for unusual events or trends. NBAD is an integral part of network behavior analysis (NBA), which offers security in addition to that provided by traditional anti-threat applications such as firewalls, intrusion detection systems, antivirus software and spyware-detection software.

  7. ethtool - Wikipedia

    en.wikipedia.org/wiki/Ethtool

    ethtool is the primary means in Linux kernel-based operating systems (primarily Linux and Android) for displaying and modifying the parameters of network interface controllers (NICs) and their associated device driver software from application programs running in userspace.

  8. Carrier-sense multiple access with collision detection

    en.wikipedia.org/wiki/Carrier-sense_multiple...

    Carrier-sense multiple access with collision detection (CSMA/CD) is a medium access control (MAC) method used most notably in early Ethernet technology for local area networking. It uses carrier -sensing to defer transmissions until no other stations are transmitting.

  9. tcpdump - Wikipedia

    en.wikipedia.org/wiki/Tcpdump

    Free and open-source software portal; Tcptrace, a tool for analyzing the logs produced by tcpdump; EtherApe, a network mapping tool that relies on sniffing traffic; Ngrep, a tool that can match regular expressions within the network packet payloads; netsniff-ng, a free Linux networking toolkit; Wireshark, a GUI based alternative to tcpdump