Home | History | Annotate | Download | only in netcat

Lines Matching full:what

95 edit the Makefile.  See the following discussions for what they are and do.
112 which may give you even more ideas about what this sort of tool is good for.
193 assign one and tell you what it is if -v is turned on. If you specify a target
196 In verbose mode you'll be informed about the inbound connection, including what
206 know what you're doing, have fun. This hack also works in UDP mode. Note that
225 what you type will go out at a fairly normal rate. -i is really designed
226 for use when you want to "measure out" what is read from files or pipes.
228 Port-scanning is a popular method for exploring what's out there. Netcat
243 mode just to see what ports the target is listening on. To limit scanning
301 "GET /what/ever" into a netcat connection to the server. I used to do this
324 error from each service, which usually indicates what it is and what version.
441 duplicates what the server expects to receive. Thus, you can test for insecure
474 directions, but you never know what interesting quirks you might turn up by
550 ports, but what if you are on a machine that also happens to be an NFS server?
624 a no-brainer. What you can do to an unfiltered syslog daemon should be fairly
626 there still blindly believe what they receive via RIP and other routing
657 identd daemon for a few minutes. If someone realizes what is going on,
800 once one understands what's going on internally. The options list of addresses
855 places. I have attempted to contain all the gross who's-got-what-.h-file
916 work is sent off to functions in what is hopefully a straightforward way.
942 together, and if I wrap enough of it around what I'm trying to accomplish,