Try it with IE11, FireFox, Opera, Safari, IronWare (on Windows and/or OSX).
logout of the forum and create another (bogus) account.
Try it with this new account.
The first thing that came into my mind was, that the sniffers are installed and they are waiting for the whole world to change their passwords and sniff them all out.
@jayjay66
Do you use the "unknaszero" option ?
When the gaps occur, do the graphs have a valid timestamp and are the "Cur In:" and "Cur Out:" values just above zero ?
Do the gaps show in the graph as a gray area ?
What version of MRTG (Perl/Apache) do you use ?
I searched through the Cisco site with the keywords "EARL L3 ASIC" and came across this page:
http://www.cisco.com/en/US/products/hw/switches/ps700/products_tech_note09186a00801b42bf.shtml
Your non-fatal message is mentioned in it.
HTH
Hi Uplater,
Glad to hear the nasty file is gone.
Have you tried Knoppix to look into the file ?
You might even try an eCom LiveCD.
http://www.ecomstation.com/democd/
This upgrades you back (!?) to the marvelous world of OS/2.
You might even share the folder and let an Apple connect to it and...
Two things pop up in my mind.
1:
Get a copy of Knoppix (or any other LiveCD OS) and boot your PC with it. Connect to the appropriate harddisk and find the guilty JPEG file. Mount the harddisk in Read/Write mode and delete the file.
http://www.knopper.net/knoppix/index-en.html
2:
What do the...
I guess MRTG will do the trick nicely.
Take a look at http://www.openinnovations.com/mrtgbundle.html
Here you find a download link to the selfExtracting RAR archive.
It must unRAR into c:\ read the readme's and you have a longterm GNU/GPL utilization monitoring system.
Hi Boab1965,
Try my all time favorite website Snapfiles.com for these questions:
http://www.snapfiles.com/Freeware/network/fwnetmoni.html
(and it is freeware too!)
or comercial products:
http://www.omnipeek.com
http://www.networkinstruments.com/products/observer/suite.html
Reading this thread, I agree with BadFrog and Linney.
As a ServiceDesker I once had to reinstall a bunch of laptops with a new OS. They all had a BIOS password which was enabled by the users. Some at startup, and some by entering the BIOS. I was not able to contact all the users so I had to find...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.