netstat - Linux Command to Display Networking Information

In linux, one of great commands for finding out information about your network connections is "netstat". It provides you interface information, statistics, connections, and a lot of other really great information about your computer.

There are many intricate commands that you can use with this program, and I won't be discussing all of them. If you would like a full review of the program, check your man or info files for more information. Below I will discuss the basic and most commonly used commands with netstat.

netstat -i (interface)

This command will give you an overview of networking on your PC. It will give you your local loopback (lo) and any network cards in your PC. This information is useful, so later you can specify a specific network interface card (NIC) that you wish to gain information on.

netstat

Using netstat alone, will give you some pretty good quick information. It gives you a list of active connections, the protocol that it is using, local and foreign address and the state of the connection. More often than not, you will not just use netstat by itself, most people add -a which gives you all listings, including ports that are actively listening.

netstat -s (statistics)

The statistics command gives you a load of great information about the data passing through your computer. It's broken down in to several main categories, IP, ICMP, TCP, UDP, and TCPEXT. Basically this command gives you a quick summery of your total packets and different kinds of connections and activities. It will give you information on failed packets, malformed packets and much more.

netstat -ap (all and process information / pid)

This is really an excellent command for finding the bulk of the information you want in a hurry. The -a gives you a full listing of all listening and active connections, and the -p gives you the process information, process name, and the pid of the program. This of course helps you trouble shoot or kill a program should you require to do so. It's also a handy way to find and kill pids that you might deem questionable by yours users.

netstat -c (continuous listing of command)

This is a pretty basic feature of the netstat command, all it does is continuously outputs the netstat data you requested over and over, every second. This is a neat little way to monitor your connections if you have a feeling something sneaky might be going on. Just leave a prompt open and running this command if you are in xwindows. Keep in mind the constant refresh will use up some processor time though.

netstat -e (extended listing)

This gives you just that little bit more information about your connections and processes. There isn't a huge difference, the primary differences you will notice right off the bat are it shows the user running the command, and the inode of the program.

Ken Dennis http://kendennis-rss.homeip.net/

Alto Pass chicago limos ..
In The News:

Tech guru Kurt "CyberGuy" Knutsson breaks down whether the government is watching citizens and what they can do to protect online privacy.
A benchmarking group for artificial intelligence has released new results evaluating the speed of hardware in running AI applications and responding to users.
Sierra Space’s Dream Chaser spaceplane provides a glimpse into the future of space travel. Traveling to space may become a part of everyday life.
The new European Hyperloop Center in the Netherlands aims bring in a new era of transportation. The center will use a steel tube as a proving ground for testing the new vehicle.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
While it may be incredibly tempting to have a “go with the flow" mindset like the rest of your vacation, your technology definitely should not be compromised while traveling.
Have you ever accidentally deleted an app from your iPhone that you’ve already paid for? Don't worry. We’ve got a trick that will help you get it back without having to buy it again.
Apple's new Journal app has raised privacy concerns among Apple's userbase. Tech expert Kim Komando examines social media rumors and explains what steps to take to protect yourself.
Although Facebook has denied that our phones listen to us, they do have other ways of finding out what we are talking about, listening to and searching for.
With the integration of OpenAI technology, Figure 01 has taken a significant leap forward, showcasing the potential of robots to understand and interact with us on a personal level.
Port Ellen, newly reopened whisky distillery in Scotland, is using SmokeDNAi technology to understand mouth-feel and flavors during the whisky maturation process.
Telly, a smart TV firm, is promising to give out their 4K 55-inch TV for free. What must you give in return? The innovative, yet potentially unsettling, answer might shock you.
The moment a spam invite hits your calendar, it’s like an uninvited guest at a party. So, what do you do? Show it the door.
Identity thieves are now targeting children and are making large sums of money by exploiting children's identities, possibly hurting their financial future.
There's a clever way to change the notification sounds on your Android without having to look at your screen. Kurt "CyberGuy" Knutsson explains.
If your bank accounted has been hacked, there are a number of steps you can take to prevent it from happening again. Kurt "CyberGuy" Knutsson explains.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
The Wave House, a data center in Heidelberg, Germany, is the the largest 3D-printed building in Europe. Its walls were built in about 140 hours.
Some government agencies around the world are struggling to meet their staffing goals when it comes to hiring artificial intelligence experts.
Google Maps' recent upgrades have introduced real-time ETA and turn-by-turn directions to your phone's lock screen while you are traveling.
Kat Cammack says AI could disrupt the 2024 election. A report says shared AI image tools generate election disinformation in 41% of cases and voting disinformation in 59% of cases.
Deepfakes have become commonplace, and the technology is only getting better, but there are certain elements that might give away the fact that an image is AI-generated.
A stealthy technology known as EM Eye allows eavesdropping on your home security cameras, according to Northeastern University researchers.
Give your iPhone an extra layer of security. Tech guru Kurt "CyberGuy" Knutsson explains the easy steps for changing the security passcode on your iPhone.
Kim Komando shares expert tech tips to maximize productivity. Learn screen recording hacks and file organization tricks to streamline your digital workflow.

FreeDOS

Before September 1995, Microsoft Windows was an MS-DOS program. DOS... Read More

Microsoft Great Plains Customization and Development ? Overview for Programmer

When Great Plains Software was designing and developing Great Plains... Read More

Spyware Protection: A Must for Any Home Computer

Now that spyware is the single most dangerous threat to... Read More

Microsoft CRM ? Consulting in the Post-Recession Time

New post-recession era has new features, which didn't exist in... Read More

Need of Document Management System (DMS)

Document Management or Enterprise Information Management is perhaps one of... Read More

Is Your Family Protected?

When you think... Read More

Great Plains Dynamics on Pervasive/Ctree support ? overview for consultant

All of us know that Microsoft bought former Great Plains... Read More

Spyware: What It Is and How to Combat It

Spyware is software or hardware installed on a computer without... Read More

Reduce TCO: The Java Database Way

TCO (Total Cost Ownership) is the buzzword in... Read More

Keeping Track

One of the things we can be as certain of... Read More

Anti-Spyware Protection ? Holes in the Shining Armor

Looking at all the ads which promise to get rid... Read More

Free PDF Publishing Software

In a previous article, I wrote about OpenOffice... Read More

The End of Spyware?

The US House of Representatives has recently passed the "Spy... Read More

Microsoft and Webmasters

Does Microsoft care for WebmastersIt's always been a problem with... Read More

Microsoft Great Plains IV: Inventory Management

Great Plains Inventory Management (IV) module gives your business a... Read More

Microsoft CRM Implementation & Customization: MS CRM Fax Gateway

With this small article we are continuing Microsoft Business Solutions... Read More

Microsoft Great Plains Implementation ? Overview for IT Director/Controller

What is installation in the language of technology? Installation... Read More

Adware and Spyware

What is 'adware'?Adware is basically software or scripts that are... Read More

Microsoft Great Plains version 8.5: Upgrade, Customization, VBA, Crystal Reports - Highlights

Microsoft Great Plains is one of the Microsoft Business Solutions... Read More

Microsoft Small Business Manager eCommerce ? Overview

Microsoft Business Solutions Small Business Manager is scaled down Great... Read More

Microsoft Great Plains: Offshore Customization & Development ? Overview for Consultant

When you visit department stores and see that majority of... Read More

Great Plains Dexterity Customization Options ? Overview For Developers

Looks like Microsoft Great Plains becomes more and more popular,... Read More

Microsoft Great Plains Distribution, Barcoding, Consignment ? overview for consultant

Microsoft Great Plains ? ERM from Microsoft Business Solutions and... Read More

Does Microsoft have any real competition?

Does Microsoft Have any Real Competition? Copyright (c) 2003 Gregory... Read More

Groupware and Version History: Collaboration Series #1

This article is the first of a series of articles... Read More

Alto Pass cool limo ..