Hello ,
using ipv6 and http/s off and using pf rule for https (web browsing group)
if i am using facebook and twitter and some other application block in app ctrl block list and web site has twitter and facebook input /review feed back or web site which allow you to post your comments /replay using facebook or twitter then thoes web site/page are reaily slow in browsing and some time page could not be display as proxy could not bypass twiter or/and facebook
[HTML]
2013:03:19-08:25:54 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="11" outitf="eth1.50" mark="0x21fa" app="506" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="23.44.161.224" proto="6" length="513" tos="0x00" prec="0x00" ttl="63" srcport="39243" dstport="80" tcpflags="ACK PSH"
2013:03:19-08:26:15 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="11" outitf="eth1.50" mark="0x21fa" app="506" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="23.44.161.224" proto="6" length="513" tos="0x00" prec="0x00" ttl="63" srcport="39252" dstport="80" tcpflags="ACK PSH"
2013:03:19-08:26:36 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="11" outitf="eth1.50" mark="0x21fa" app="506" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="23.44.161.224" proto="6" length="513" tos="0x00" prec="0x00" ttl="63" srcport="39256" dstport="80" tcpflags="ACK PSH"
2013:03:19-08:26:57 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="11" outitf="eth1.50" mark="0x21fa" app="506" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="23.44.161.224" proto="6" length="513" tos="0x00" prec="0x00" ttl="63" srcport="39264" dstport="80" tcpflags="ACK PSH"
2013:03:19-08:27:17 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="11" outitf="eth1.50" mark="0x21fa" app="506" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="23.44.161.224" proto="6" length="513" tos="0x00" prec="0x00" ttl="63" srcport="39267" dstport="80" tcpflags="ACK PSH"
2013:03:19-08:27:41 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="11" outitf="eth1.50" mark="0x21fa" app="506" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="23.44.161.224" proto="6" length="539" tos="0x00" prec="0x00" ttl="63" srcport="39281" dstport="80" tcpflags="ACK PSH"
2013:03:19-08:27:47 acenn ulogd[4936]: id="2017" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Alert" action="log" fwrule="4" outitf="eth1.50" mark="0x2093" app="147" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="173.252.100.27" proto="6" length="781" tos="0x00" prec="0x00" ttl="63" srcport="37537" dstport="80" tcpflags="ACK PSH"
2013:03:19-08:27:48 acenn ulogd[4936]: id="2017" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Alert" action="log" fwrule="4" outitf="eth1.50" mark="0x2093" app="147" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="69.192.4.145" proto="6" length="723" tos="0x00" prec="0x00" ttl="63" srcport="39428" dstport="80" tcpflags="ACK PSH"
2013:03:19-08:27:48 acenn ulogd[4936]: id="2017" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Alert" action="log" fwrule="4" outitf="eth1.50" mark="0x2093" app="147" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="69.192.4.145" proto="6" length="661" tos="0x00" prec="0x00" ttl="63" srcport="39429" dstport="80" tcpflags="ACK PSH"
2013:03:19-08:28:03 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="11" outitf="eth1.50" mark="0x21fa" app="506" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="95.101.193.224" proto="6" length="539" tos="0x00" prec="0x00" ttl="63" srcport="50042" dstport="80" tcpflags="ACK PSH"
2013:03:19-08:28:23 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="11" outitf="eth1.50" mark="0x21fa" app="506" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="95.101.193.224" proto="6" length="539" tos="0x00" prec="0x00" ttl="63" srcport="50044" dstport="80" tcpflags="ACK PSH"
2013:03:19-08:28:44 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="11" outitf="eth1.50" mark="0x21fa" app="506" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="23.44.161.224" proto="6" length="539" tos="0x00" prec="0x00" ttl="63" srcport="39346" dstport="80" tcpflags="ACK PSH"
2013:03:19-08:29:05 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="11" outitf="eth1.50" mark="0x21fa" app="506" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="95.101.193.224" proto="6" length="539" tos="0x00" prec="0x00" ttl="63" srcport="50054" dstport="80" tcpflags="ACK PSH"
2013:03:19-08:29:16 acenn afcd[5940]: vy_plugin: N: finalizing vineyard thread
2013:03:19-08:29:17 acenn afcd[5940]: STATUS: alert_lvl="GREEN" run_time=7284 num_cts=0 pktps_avg=0.60 pktps_avg_max=126.22 skipped_pktps_avg=0.00 skipped_pktps_avg_max=2.19 connps_avg=0.00 connps_avg_max=35.75 rusage_sys=3.108 rusage_usr=3.048
2013:03:19-08:29:17 acenn afcd[5940]: CIFS (nfmark 00000048): 57 packets, 57 connections
2013:03:19-08:29:17 acenn afcd[5940]: DNS (nfmark 0000007c): 12792 packets, 6390 connections
2013:03:19-08:29:17 acenn afcd[5940]: DROPBOX (nfmark 0000007f): 123 packets, 123 connections
2013:03:19-08:29:17 acenn afcd[5940]: FACEBOOK (nfmark 00000093): 146 packets, 56 connections
2013:03:19-08:29:17 acenn afcd[5940]: GMAIL (nfmark 000000ad): 14 packets, 4 connections
2013:03:19-08:29:17 acenn afcd[5940]: GOOGANAL (nfmark 000000af): 55 packets, 15 connections
2013:03:19-08:29:17 acenn afcd[5940]: GOOGAPIS (nfmark 000000b0): 26 packets, 6 connections
2013:03:19-08:29:17 acenn afcd[5940]: GOOGLE (nfmark 000000b6): 568 packets, 240 connections
2013:03:19-08:29:17 acenn afcd[5940]: GOOGPLUS (nfmark 0000024c): 3 packets, 1 connections
2013:03:19-08:29:17 acenn afcd[5940]: GOOGSAFE (nfmark 000000b7): 6 packets, 2 connections
2013:03:19-08:29:17 acenn afcd[5940]: HTTP (nfmark 000000d3): 955 packets, 292 connections
2013:03:19-08:29:17 acenn afcd[5940]: LINKEDIN (nfmark 0000010c): 8 packets, 2 connections
2013:03:19-08:29:17 acenn afcd[5940]: MOZILLA (nfmark 000002a7): 88 packets, 36 connections
2013:03:19-08:29:17 acenn afcd[5940]: NETBIOS (nfmark 00000146): 6 packets, 6 connections
2013:03:19-08:29:17 acenn afcd[5940]: NFS (nfmark 00000150): 1 packets, 1 connections
2013:03:19-08:29:17 acenn afcd[5940]: NTP (nfmark 0000015d): 5 packets, 5 connections
2013:03:19-08:29:17 acenn afcd[5940]: PINTERST (nfmark 000002b4): 25 packets, 7 connections
2013:03:19-08:29:17 acenn afcd[5940]: POP3 (nfmark 0000017a): 17 packets, 17 connections
2013:03:19-08:29:17 acenn afcd[5940]: SMTP (nfmark 000001ca): 152 packets, 152 connections
2013:03:19-08:29:17 acenn afcd[5940]: SNMP (nfmark 000001ce): 4 packets, 4 connections
2013:03:19-08:29:17 acenn afcd[5940]: SSH (nfmark 000001d8): 64 packets, 1 connections
2013:03:19-08:29:17 acenn afcd[5940]: SSL (nfmark 000001d9): 525 packets, 92 connections
2013:03:19-08:29:17 acenn afcd[5940]: SYSLOG (nfmark 000001e8): 28 packets, 28 connections
2013:03:19-08:29:17 acenn afcd[5940]: TWITTER (nfmark 000001fa): 417 packets, 66 connections
2013:03:19-08:29:17 acenn afcd[5940]: YOUTUBE (nfmark 0000022d): 44 packets, 14 connections
2013:03:19-08:29:17 acenn afcd[5940]: packets: 35100 (30007 inspected, 81 skipped)
2013:03:19-08:29:17 acenn afcd[5940]: connections: 10813 (7617 classified)
2013:03:19-08:29:18 acenn afcd[9135]: _afc_cfg_file_plugin_parse: 745 protocols registered
2013:03:19-08:29:18 acenn afcd[9135]: loaded plugin '/var/sec/chroot-afc/lib/afc/vineyard.so'
2013:03:19-08:29:18 acenn afcd[9135]: _afc_cfg_file_plugin_parse: 745 protocols registered
2013:03:19-08:29:18 acenn afcd[9164]: AFC ready.
2013:03:19-08:29:26 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="11" outitf="eth1.50" mark="0x21fa" app="506" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="95.101.193.224" proto="6" length="539" tos="0x00" prec="0x00" ttl="63" srcport="50059" dstport="80" tcpflags="ACK PSH"
2013:03:19-08:29:44 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="4" outitf="eth1.50" mark="0x2093" app="147" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="95.100.130.110" proto="6" length="233" tos="0x00" prec="0x00" ttl="63" srcport="54241" dstport="443" tcpflags="ACK PSH"
2013:03:19-08:29:46 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="11" outitf="eth1.50" mark="0x21fa" app="506" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="95.101.193.224" proto="6" length="539" tos="0x00" prec="0x00" ttl="63" srcport="50121" dstport="80" tcpflags="ACK PSH"
2013:03:19-08:29:56 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="4" outitf="eth1.50" mark="0x2093" app="147" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="31.13.64.7" proto="6" length="858" tos="0x00" prec="0x00" ttl="63" srcport="44205" dstport="80" tcpflags="ACK PSH"
2013:03:19-08:30:07 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="11" outitf="eth1.50" mark="0x21fa" app="506" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="23.44.161.224" proto="6" length="539" tos="0x00" prec="0x00" ttl="63" srcport="39503" dstport="80" tcpflags="ACK PSH"
2013:03:19-08:30:28 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="11" outitf="eth1.50" mark="0x21fa" app="506" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="23.44.161.224" proto="6" length="539" tos="0x00" prec="0x00" ttl="63" srcport="39520" dstport="80" tcpflags="ACK PSH"
2013:03:19-08:30:49 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="11" outitf="eth1.50" mark="0x21fa" app="506" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="95.101.193.224" proto="6" length="539" tos="0x00" prec="0x00" ttl="63" srcport="50232" dstport="80" tcpflags="ACK PSH"
2013:03:19-08:31:09 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="11" outitf="eth1.50" mark="0x21fa" app="506" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="95.101.193.224" proto="6" length="374" tos="0x00" prec="0x00" ttl="63" srcport="50246" dstport="80" tcpflags="ACK PSH"
2013:03:19-08:31:11 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="4" outitf="eth1.50" mark="0x3093" app="147" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="23.11.114.110" proto="6" length="265" tos="0x00" prec="0x00" ttl="63" srcport="51202" dstport="443" tcpflags="ACK PSH"
2013:03:19-08:31:11 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="4" outitf="eth1.50" mark="0x2093" app="147" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="95.100.130.110" proto="6" length="233" tos="0x00" prec="0x00" ttl="63" srcport="54474" dstport="443" tcpflags="ACK PSH"
2013:03:19-08:31:11 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="4" outitf="eth1.50" mark="0x2093" app="147" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="31.13.64.7" proto="6" length="225" tos="0x00" prec="0x00" ttl="63" srcport="39646" dstport="443" tcpflags="ACK PSH"
2013:03:19-08:31:11 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="4" outitf="eth1.50" mark="0x2093" app="147" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="31.13.64.7" proto="6" length="1205" tos="0x00" prec="0x00" ttl="63" srcport="44345" dstport="80" tcpflags="ACK PSH"
2013:03:19-08:31:11 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="4" outitf="eth1.50" mark="0x2093" app="147" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="31.13.64.7" proto="6" length="1204" tos="0x00" prec="0x00" ttl="63" srcport="44346" dstport="80" tcpflags="ACK PSH"
2013:03:19-08:31:12 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="11" outitf="eth1.50" mark="0x21fa" app="506" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="124.40.42.46" proto="6" length="753" tos="0x00" prec="0x00" ttl="63" srcport="46638" dstport="80" tcpflags="ACK PSH"
2013:03:19-08:31:13 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="4" outitf="eth1.50" mark="0x3093" app="147" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="23.11.114.110" proto="6" length="265" tos="0x00" prec="0x00" ttl="63" srcport="51202" dstport="443" tcpflags="ACK PSH"
2013:03:19-08:31:15 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="4" outitf="eth1.50" mark="0x3093" app="147" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="23.11.114.110" proto="6" length="265" tos="0x00" prec="0x00" ttl="63" srcport="51202" dstport="443" tcpflags="ACK PSH"
2013:03:19-08:31:19 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="4" outitf="eth1.50" mark="0x2093" app="147" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="31.13.64.7" proto="6" length="551" tos="0x00" prec="0x00" ttl="63" srcport="44393" dstport="80" tcpflags="ACK PSH"
2013:03:19-08:31:20 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="4" outitf="eth1.50" mark="0x3093" app="147" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="23.11.114.110" proto="6" length="265" tos="0x00" prec="0x00" ttl="63" srcport="51202" dstport="443" tcpflags="ACK PSH"
2013:03:19-08:31:29 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="4" outitf="eth1.50" mark="0x3093" app="147" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="23.11.114.110" proto="6" length="265" tos="0x00" prec="0x00" ttl="63" srcport="51202" dstport="443" tcpflags="ACK PSH"
2013:03:19-08:31:30 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="11" outitf="eth1.50" mark="0x21fa" app="506" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="95.101.193.224" proto="6" length="374" tos="0x00" prec="0x00" ttl="63" srcport="50384" dstport="80" tcpflags="ACK PSH"
2013:03:19-08:31:32 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="4" outitf="eth1.50" mark="0x3093" app="147" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="23.11.114.110" proto="6" length="52" tos="0x00" prec="0x00" ttl="63" srcport="51202" dstport="443" tcpflags="ACK FIN"
2013:03:19-08:31:32 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="11" outitf="eth1.50" mark="0x21fa" app="506" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="124.40.42.38" proto="6" length="753" tos="0x00" prec="0x00" ttl="63" srcport="46399" dstport="80" tcpflags="ACK PSH"
2013:03:19-08:31:34 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="4" outitf="eth1.50" mark="0x3093" app="147" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="23.11.114.110" proto="6" length="64" tos="0x00" prec="0x00" ttl="63" srcport="51202" dstport="443" tcpflags="ACK"
2013:03:19-08:31:37 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="4" outitf="eth1.50" mark="0x3093" app="147" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="31.13.64.7" proto="6" length="52" tos="0x00" prec="0x00" ttl="63" srcport="39718" dstport="443" tcpflags="ACK"
2013:03:19-08:31:37 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="4" outitf="eth1.50" mark="0x3093" app="147" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="31.13.64.7" proto="6" length="260" tos="0x00" prec="0x00" ttl="63" srcport="39718" dstport="443" tcpflags="ACK PSH"
2013:03:19-08:31:38 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="4" outitf="eth1.50" mark="0x3093" app="147" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="31.13.64.7" proto="6" length="64" tos="0x00" prec="0x00" ttl="63" srcport="39718" dstport="443" tcpflags="ACK"
2013:03:19-08:31:39 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="4" outitf="eth1.50" mark="0x3093" app="147" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="31.13.64.7" proto="6" length="64" tos="0x00" prec="0x00" ttl="63" srcport="39718" dstport="443" tcpflags="ACK"
2013:03:19-08:31:41 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="4" outitf="eth1.50" mark="0x3093" app="147" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="31.13.64.7" proto="6" length="64" tos="0x00" prec="0x00" ttl="63" srcport="39718" dstport="443" tcpflags="ACK"
2013:03:19-08:31:43 acenn ulogd[4936]: id="2019" severity="info" sys="SecureNet" sub="packetfilter" name="AFC Block" action="drop" fwrule="4" outitf="eth1.50" mark="0x3093" app="147" srcmac="0:c:29:7b:b4:8f" srcip="192.168.7.125" dstip="31.13.64.7" proto="6" length="260" tos="0x00" prec="0x00" ttl="63" srcport="39718" dstport="443" tcpflags="ACK PSH"
[/HTML]
[HTML]2013:03:19-08:34:08 acenn kernel: [ 7656.614351] [10458] 30 10458 2740 147 8 263 0 httpd
2013:03:19-08:34:08 acenn kernel: [ 7656.614353] [10582] 810 10582 368558 90565 335 0 0 httpproxy
2013:03:19-08:34:08 acenn kernel: [ 7656.614356] [10802] 0 10802 602 128 4 5 0 cron
2013:03:19-08:34:08 acenn kernel: [ 7656.614358] [10809] 0 10809 3907 2788 12 0 0 audld.plx
2013:03:19-08:34:08 acenn kernel: [ 7656.614361] [10815] 0 10815 11913 6853 26 1404 0 confd.plx
2013:03:19-08:34:08 acenn kernel: [ 7656.614363] [10816] 0 10816 476 12 4 0 0 sleep
2013:03:19-08:34:08 acenn kernel: [ 7656.614365] [10817] 0 10817 11913 2992 26 5245 0 confd.plx
2013:03:19-08:34:08 acenn kernel: [ 7656.614375] [10818] 0 10818 11913 2688 26 5216 0 confd.plx
2013:03:19-08:34:08 acenn kernel: [ 7656.614377] Out of memory: Kill process 6344 (snort_inline) score 178 or sacrifice child
2013:03:19-08:34:08 acenn kernel: [ 7656.614380] Killed process 6344 (snort_inline) total-vm:779484kB, anon-rss:63808kB, file-rss:8808kB [/HTML]
if you look at bottam statu bar you will notice waiting for facbook /connecteing (ed) to facebook /twiter for long time
edit:another quick quastion where i can will get the application and thier number which was reported by afc/application control