answersLogoWhite

0

In some platforms this can be using the ndd command.

ndd -set /dev/ip ip_respond_to_timestamp 0

User Avatar

Wiki User

17y ago

What else can I help you with?

Related Questions

How do you calculate the checksum of ICMP packet?

To calculate the checksum of an ICMP packet, you first need to create a pseudo-header that includes the source and destination IP addresses, the protocol number (1 for ICMP), and the length of the ICMP packet. Then, concatenate this pseudo-header with the ICMP packet data. The checksum is computed by performing a bitwise one's complement sum of all 16-bit words in the combined data, followed by taking the one's complement of the final sum. Finally, the calculated checksum is inserted into the ICMP packet's checksum field.


How the traceroute utility uses ICMP ECHO requests to trace the path from one networked node to another identifying all intermediate hops between the two nodes?

The traceroute utility uses ICMP ECHO requests by sending packets with incrementally increasing Time to Live (TTL) values. Each router that handles the packet decrements the TTL; when it reaches zero, the router sends back an ICMP Time Exceeded message to the sender. By starting with a TTL of 1 and increasing it for each subsequent packet, traceroute identifies each intermediate hop along the path to the destination, displaying the round-trip time for each hop. Ultimately, this process reveals the entire route taken by packets from the source to the destination.


What can one do with a time stamp in computer science?

A timestamp in computer science is used in some databases to safely handle transactions. It is used to accurately represent an instant in time. Every time a transaction is started, it is given a timestamp.


What is the purpose of icmp testing?

There can be at least two reasons for icmp (ping) testing. One is for security reasons (watching for ping floods, amplifier attacks) and the other is to test timing between two endpoints.


Why it is important to prioritize requests?

It is important to prioritize requests because then one is able to plan out more effectively how to fulfill one's obligations. It is helpful to work on urgent requests first then less urgent ones later.


What computer protocol should be blocked to prevent malicious traffic and Trojan's?

Pretty much every protocol used for malicious traffic and Trojans is also used for legitimate traffic. You cannot block all bad traffic just by filtering on protocols. When given that ICMP and HTTP are both allowed, if you have to block one, block ICMP. Choices were: DNS DHCP ICMP HTTP https://library.skillport.com/courseware/cbtlib/TPSY0201/metadata/eng/TPSY0201B.htm?


What is a request sentence?

A request sentence is one that asks (or requests) for something.


Does the mercuy car have more then one filter?

Yes, it has a fuel filter, air filter, oil filter, and possibly a cabin filter.


How do i check old friends request on facebook?

One can find old friend requests on Facebook, by clicking on the small people icon in the upper left hand corner of the sites page. When the icon is clicked a list of the new, and the most recent friend requests are displayed along with old requests that the person has accepted.


Where is the fuel filter on a 1980 dodge colt?

one filter where gas line goes in carb then you have one at gas tank a in line filter


Can you give me a example sentences using the word the?

The is one of the most common words in the English language.This is one of the strangest requests.


How do you get married in Rune factory 2?

Complete all of her requests on the Help Board. In one her of requests you will get a special item used to propose to that girl specifically. Once you have her to Ten LP use the item to propose.