Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

DCC Send limiting in IRSSI

Posted on 2004-08-02
4
Medium Priority
?
882 Views
Last Modified: 2013-11-13
Hey I have a fserv script on irssi now it works well but I need to cap my dcc sends some how because it really slows down my net uploading at full speed, I installed irssi via a RPM on redhat 9 because I didn't want to install all the development tools since it's a gateway machine anyway does anyone know how I could limit DCC sends ?

thanks, Josh.
0
Comment
Question by:Jester-
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 

Author Comment

by:Jester-
ID: 11712901
anyone
0
 
LVL 1

Accepted Solution

by:
prodigy2u3 earned 1600 total points
ID: 11731790
Ok, here's what I've found for you.  I couldn't find anything regarding how to limit uploads in IRSSI only, but I did find a method to limit uploads via "flags" (ie: *.mp3, *.avi etc)  This method relies on using Squid Proxy.  Squid Proxy has a feature called "delay pools".  It basically takes your file, buffers it, and only allows it to leave the network at a speed you specify.  (note: if your linux box is going to be a gateway for your network to the internet, it will delay ALL files leaving the network with the flags)

http://www.linux.org/docs/ldp/howto/Bandwidth-Limiting-HOWTO/install.html

I hope you like to compile software, because to do this, you need to compile with certain options specified.  Delay pools also works with downloads, just incase you care.  That howto will walk you through it.  This is not nearly as easy as what you were probably hoping for, but I hope it helps.

Dan
0

Featured Post

Does Your Cloud Backup Use Blockchain Technology?

Blockchain technology has already revolutionized finance thanks to Bitcoin. Now it's disrupting other areas, including the realm of data protection. Learn how blockchain is now being used to authenticate backup files and keep them safe from hackers.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Linux users are sometimes dumbfounded by the severe lack of documentation on a topic. Sometimes, the documentation is copious, but other times, you end up with some obscure "it varies depending on your distribution" over and over when searching for …
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Suggested Courses

715 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question