Hi, I guess there are different netcat versions around. "nc -l -p 6010 -v -v" definitely works here and "man netcat" says
"nc -l -p port [-options] [hostname] [port]" I also now realized that if Malice forwards the data to the ipv6 port she can completely passively eavesdrop everything alice does. This can be done with something like strace -f -o strace.out -s 4096 socat TCP-LISTEN:6010,fork,reuseaddr TCP6:ip6-localhost:6010 and looking at strace.out (I'm sure there's some easier way to log traffic with socat but couldn't find it yet). best regards, Timo Lindfors -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]