A systems administrator receives reports of an internet-accessible Linux server that is running very sluggishly. The administrator examines the server, sees a high amount of memory utilization, and suspects a DoS attack related to half-open TCP sessions consuming memory. Which of the following tools would best help to prove whether this server was experiencing this behavior?
kmordalv
Highly Voted 11 months, 3 weeks agochaddman
Highly Voted 9 months, 3 weeks ago