Its probably just like ICQ or AIM , constantly contacting the server to
verify status of the client...

In any case, it seems to not match your approved code of conduct, so take a
management position and fire the little maggot  :-) :-) 

Actually, I have worked in some places that would do exactly that.........I
would put a proxy box on the network and can anything not on ports 80, 25,
110 without the user applying for it

*********** REPLY SEPARATOR  ***********

On 6/04/00 at 13:52 Edward Dekkers wrote:

>> doesn't really say anything about what the hell it's actually spewing
out,
>> but at least it's somewhere to start...
>
>Thanks to all who responded.
>
>I know now what it is, but after reading all the relevant docs etc., I'm
>still no closer to knowing what the hell it was sending into the
bitstream,
>when it really seemed like the user wasn't doing anything. He didn't even
>have contactable people set up yet, he'd only just installed it a few days
>ago.
>
>I hate not knowing exactly what programs do!


Regards

Greg Wright
IT Consultant Sydney Australia

-- 

*** Please trim any replies ***
*** Please turn off HTML in your email ***
*** Please don't use the list for test messages ***
*** Why not read the archives? http://moongroup.com/redhat.phtml ***


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.

Reply via email to