From: "Jon Harrison" Received: from [192.168.100.201] (HELO mail.2rosenthals.com) by 2rosenthals.com (CommuniGate Pro SMTP 5.1.3) with ESMTP id 1597402 for os2-wireless_users@2rosenthals.com; Mon, 21 Jan 2008 03:06:37 -0500 Received-SPF: none (secmgr-ny.randr: 216.162.174.4 is neither permitted nor denied by domain of seadog.reno.nv.us) client-ip=216.162.174.4; envelope-from=jharrison@seadog.reno.nv.us; helo=pop4.greatbasin.net; Received: from pop4-wpti.greatbasin.net ([216.162.174.4] helo=pop4.greatbasin.net) by secmgr-ny.randr with esmtp (Exim 4.43) id 1JGrfn-0004Lo-Eb for os2-wireless_users@2rosenthals.com; Mon, 21 Jan 2008 03:06:29 -0500 Received: from DP6550.seadog.reno.nv.us (seadog.reno.nv.us [216.82.144.188]) (authenticated bits=0) by pop4.greatbasin.net (8.13.8/8.13.8) with ESMTP id m0L86Chh027627 for ; Mon, 21 Jan 2008 00:06:13 -0800 Received: from TYAN.seadog.reno.nv.us (TYAN.seadog.reno.nv.us [192.168.1.35]) by DP6550.seadog.reno.nv.us (Weasel v1.72) for ; 21 Jan 2008 00:06:12 -0800 Message-ID: <004-71529447-11326.045@seadog.reno.nv.us> To: "OS/2 Wireless Users Mailing List" Date: Mon, 21 Jan 2008 00:06:09 -0800 (PST) Priority: Normal User-Agent: PMMail/2.90 (os/2; U; Warp 4.5; en-US; i386; ver 2.90.04.0847) X-Mailer: PMMail (Beta 4) 2.90.04.0847 for OS/2 Warp 4.5 In-Reply-To: <177045.20.09.34.17.01.2008@seadog.reno.nv.us> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Subject: Re: [OS2Wireless] Logging network activity from VPC X-Spam-Score: -1.4 (-) X-Spam-Report: -1.4 ALL_TRUSTED Passed through trusted hosts only via SMTP On Thu, 17 Jan 2008 23:04:49 -0500 (EST), Hakan wrote: > >Can I use the OS/2 program -- is it tracert? -- to log network activity >that originates from an application running in VPC? Tivo desktop talks to Tivo Media Server on port 80/http. You can use iptrace to discover what it sez. It passes on the DVR ID, software version, and other data. IPTrace won't show you the packets of the actual file transfer nor the catalog listing. When starting Tivo Desktop first it goes 'calls home', possibly it's a form of verification. Here it goes to 204.176.49.2 which is Verizon Business. Verizon has nothing to do with my tivo installation as far as I am aware. So Tivo must use them for verification. If you ever get anywhere I'd be interested to see what you come up with. I've never tried to hack into my Tivo but I know it can be done. I believe the OS is a linux distro. What are you going to do with tivo files using OS/2? Thanks, jon