?
Solved

socket & process-id

Posted on 1997-05-06
3
Medium Priority
?
211 Views
Last Modified: 2013-12-23
the comand netstat -a
gives me a port *.21946 that is in LISTEN. This port is acting like a WEB Server. I would like to know WHICH process has created this socket.
My problem is that my WEB Server asks TWO TIMES the authentication for password protected directories. Once for the correct port and a second time for this "Zombie" Port.
Any help will be apreciated
Thank You very much
0
Comment
Question by:rv33100
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 1

Expert Comment

by:linas
ID: 1582061
which web server? what operating system?  what happens when you
point you web browser at http://your.host:21946/
0
 
LVL 2

Accepted Solution

by:
red031197 earned 300 total points
ID: 1582062
I dont think you can unless theres a shareware prog that'll do it check your portmapper config and spawning scripts for the http server as this is listening for nothing i presume
0
 

Expert Comment

by:tgast
ID: 1582063
0

Featured Post

New benefit for Premium Members - Upgrade now!

Ready to get started with anonymous questions today? It's easy! Learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Originally, this post was published on Monitis Blog, you can check it here . It goes without saying that technology has transformed society and the very nature of how we live, work, and communicate in ways that would’ve been incomprehensible 5 ye…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Suggested Courses

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question