Deutsch   English   Français   Italiano  
<slrnvubbbg.771v.candycanearter07@candydeb.host.invalid>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!news.misty.com!weretis.net!feeder9.news.weretis.net!news.quux.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail
From: candycanearter07 <candycanearter07@candycanearter07.nomail.afraid>
Newsgroups: comp.os.linux.advocacy
Subject: Re: Please List Your Open Ports
Date: Thu, 27 Mar 2025 20:00:03 -0000 (UTC)
Organization: the-candyden-of-code
Lines: 27
Message-ID: <slrnvubbbg.771v.candycanearter07@candydeb.host.invalid>
References: <pan$98f5f$d61a8c9$9aa88326$ea218693@linux.rocks>
 <vr76h7$2bde5$1@dont-email.me>
 <pan$46871$67579cb1$5784d130$83cc267d@linux.rocks>
 <vr7jt7$u90$2@solani.org>
 <182d90d4ed38e644$26628$19313$802601b3@news.usenetexpress.com>
 <vr9pji$lv2o$1@dont-email.me> <vr9pvj$1u7s$1@solani.org>
 <pan$4e8$4d696b10$4b4e7f71$ac9f14e9@linux.rocks>
Injection-Date: Thu, 27 Mar 2025 21:00:03 +0100 (CET)
Injection-Info: dont-email.me; posting-host="ed04667ecee1e06863f25a37bfee78bf";
	logging-data="1077457"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX19qWgMQoKVgE7zhaRel/sz7esjKofgBclO2qDCLA+e6PQ=="
User-Agent: slrn/1.0.3 (Linux)
Cancel-Lock: sha1:9plEFKeELnqwPk5UtdcbAubjtz8=
X-Face: b{dPmN&%4|lEo,wUO\"KLEOu5N_br(N2Yuc5/qcR5i>9-!^e\.Tw9?/m0}/~:UOM:Zf]%
 b+ V4R8q|QiU/R8\|G\WpC`-s?=)\fbtNc&=/a3a)r7xbRI]Vl)r<%PTriJ3pGpl_/B6!8pe\btzx
 `~R! r3.0#lHRE+^Gro0[cjsban'vZ#j7,?I/tHk{s=TFJ:H?~=]`O*~3ZX`qik`b:.gVIc-[$t/e
 ZrQsWJ >|l^I_[pbsIqwoz.WGA]<D
Bytes: 2404

Farley Flud <ff@linux.rocks> wrote at 19:09 this Monday (GMT):
> On Mon, 17 Mar 2025 13:34:27 -0500, Physfitfreak wrote:
>
>> 
>> Running tcpdump gives me this error:
>> 
>>       tcpdump: eno1: You don't have permission to capture on that device
>>
>
> You must execute tcpdump as the root user.
>
> On my machine I am always the root user, but the stupid distros have their
> own ridiculous security philosophy.  I believe that their asinine command
> workaround is this:
>
> sudo tcpdump

I think that's considered bad practice, but it's your machine..

> Also, read the tcpdump man page or search for tcpdump web pages.
> There is a LOT that the command can do.


Thanks, this program seems super cool! IDK if I'll use it for anything
productive, but it'll be cool to see.
-- 
user <candycane> is generated from /dev/urandom