I have noticed that when I log on the Wireless Network Connection Status
Window shows that the packets leaving my computer almost equal the packets
entering the computer, even though I am not uploading any files. Is this an
indication that a keystroke logger or similar malware is exporting files from
my computer, also is there any way that I can monitor the actual data content
that is leaving my machine?
The network is a busy place, even when you’re doing nothing at all. It’s not
necessarily the sign of something bad, and not something most people even
notice.
Depending on just how detailed – and geeky – you want to get, there are
tools that will let you monitor what’s happening to varying degrees – all free.
]]>
<





I have to say that Firefox does not have the second “f” capitalized.
Good article though.
as a new comer to your site,i’m finding articals helpful,answering my questions before i submit them,thank you Leo
Hi Leo, Is there a way to lock out incoming online or pinging. My computer is being accesses by a x roommate and I would like to stop his access. Thank you for your time and help
John Pennington
20-Jan-2010
Great article an thanks for the new tools/toys I now get to play with. lol Also, who gives a crapola if FIREFOX has 2 Fs capitalized or not. It doesnt even have anything to do with your article. Just a FireFOX fanboy, worse than the Apple fanboy/creeps who stalk websites like this.
The original question was based around:-
“the packets leaving my computer almost equal the packets entering the computer, even though I am not uploading any files” – which you omitted to address !
As I understand it, he’s right, and, in simple terms that even I can understand, the conversation goes something like this:-
Server: “Here, Buddy, this is for you – ready?”
PC: “Yup. Send it.”
Server: “It went. Did you get it OK ?”
PC: “Yup. Send more.”
Server: “It went. Did you get it OK ?”
PC: “Yup. Send more.”……
Server: “It went. Did you get it OK ?”
PC: “Nope. Try it agian.”
Server: “It went. Did you get it OK ?”
PC: “Yup. Send more.”
i.e., EVERY packet has a reply, though obviously not as big. That is why usually (or it used to be the case) upload speeds are set FAR slower than download speeds.
Tell me if I’m wrong ?
Have a good trip !
I get a similar list directly from the command window:
netstat
Now when I do a Netstat while visiting Ask-Leo.com
I get a pile of these:
a96-17-8-75.deploy.akamaitechnologies.com
what exactly are they trying to deploy onto my machine?
I know that’s just part of the “address”
but they didn’t choose deploy for no good reason
(The GUI looks like a good Idea for enhanced nitpicking through the connections though)
@robin: You are correct in concept, but not in the details. It’s been a long time since I learned about this, but the server sends many packets before the PC responds with an “I got it”. More specifically, the PC responds with “the last packet I got was number 12345”. It would be far too inefficient for the PC to respond to each packet from the server. There’s buffering going on.
Also, this only applies to TCP, not to UDP.
Thanks for the artcle. I played the asnyc/bysinc
game a few years ago while I managed masses of data for AT&T. It’s a field all by itself.
Thank you
Jim
@Richard – That’s nothing but an internal Akamai naming convention. That means you are connected to 96.17.8.75.
Hello,
I have currently a big problem on my desktop: A malware is sending netios connection requests to several IPs. I detected this only by Wireshark. Neither ProcessExp nor TCPView couldn’t detect it – (Seems that it is a hidden driver or the netcard driver has been patched ) How can I track down those connections from wireshark view to a process?