Lines Matching full:be
14 .\" 3. The name of the author may not be used to endorse or promote products
20 .\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
110 Cannot be used together with any of the options
139 Cannot be used with
150 and cannot be used with
180 Cannot be used together with any of the options
196 If a name cannot be resolved without DNS, an error will be reported.
200 During the TLS handshake, load data to be stapled from
210 If no username is specified then authentication will not be attempted.
216 Cannot be used together with
237 to create and use so that datagrams can be received.
238 Cannot be used together with
247 may be one of:
261 which allows the supported TLS ciphers to be specified (see
265 which allows the supported TLS protocols to be specified (see
273 may be one of
294 Cannot be used together with any of the options
298 Cannot be used together with
313 Set the routing table to be used.
321 Connections which cannot be established or are idle timeout after
358 An IPv6 address can be specified unambiguously by enclosing
361 A proxy cannot be used with any of the options
371 Cannot be used together with
376 can be a numerical IP address or a symbolic hostname
380 In general, a destination must be specified,
393 can be specified as a numeric port number or as a service name.
394 Port ranges may be specified as numeric port numbers of the form
397 a destination port must be specified,
420 There should now be a connection between the ports.
421 Anything typed at the second console will be concatenated to the first,
429 The connection may be terminated using an
436 The example in the previous section can be expanded to build a
438 Any information input into one end of the connection will be output
439 to the other end, and input and output can be easily captured in order to
450 process, feeding it the file which is to be transferred:
460 when it might be necessary to verify what data a server is sending
468 They can be filtered, using a tool such as
472 More complicated examples can be built up when the user knows the format
474 As another example, an email may be submitted to an SMTP server using:
487 It may be useful to know which ports are open and running services on
491 flag can be used to tell
504 Alternatively, it might be useful to know which server software
509 This can be accomplished by specifying a small timeout with the
553 This example could also be used by
587 combination could be useful for communications diagnostics.
588 Note that the amount of UDP traffic generated may be limited either