John Vivian <[EMAIL PROTECTED]> a �crit :

|       A 'ping' consists of two types of ICMP packets; an "echo-request",
|       and an "echo-reply".
| 
|       Take a look at the network traffic for "echo-requests" from the
| hosts
|       that your machine is sending the "echo-reply" to; you should see
| them.

It should be better to look for echo-requests addressed to neural1.fe.up.pt
since source address of the echo-requests could be forged.

|       i may be incorrect with this next statement (corrections anyone?),
| if
|       you do not see any "echo-requests" that correspond to the
| "echo-replys"
|       you are seeing, then it may be possible that someone has compromised
|       your machines.  This is probably not the case, though i can't say
| for
|       certain.  The bottom line is that if you see the "echo-requests",
| then
|       mystery solved.  Otherwise, you may wish to post again with more
| details.
| 
|       Hope this helps.  Can anyone else provide more info?

I do not know any other reason for echo-replys...

-- 
o-o

[EMAIL PROTECTED] (Michel Verdier)
http://www.chez.com/mverdier


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to