Originally Posted by twobob
Far as I can make out: This is what is run by the N U Z x command
EDIT: All that stuff should be there, far as I can tell. files are there. configs. iptables is definitely set to allow all traffic on usb0.
sneaky folder killer removed. Can you think of anything else I might have missed or could do next?
nmap - on the PC, see if it can find port 22 open.
ps aux - on the Kindle see if dropbear is running and what it has open.
If worse comes to worse, strace the dripbear start-up, see what's failing.