ylbtech- Miscellaneous - log: (log) |
1. Back to top |
1、
Outline
Network equipment
, systems and services program, will have a call log event record at the time of the operation; each line of the log to record his description of the related operations of the date, time, user and action and so on.
Windows
network operating systems
are designed with a variety of log files, such as
application
logs,
security logs
,
system log
, Scheduler service log, FTP log, WWW logs, DNS
server
log, etc., these open systems based on your service different vary. When we do something on the system, these log files are usually recorded in some of our operations related content, the content is quite useful for system security staff. For example, the system was someone IPC
detection
, the system will quickly note the Surveyor probe when used in IP, time, user name, etc. in the security log, after probing with FTP, FTP log in will note the
IP
, time, user name, etc. probe used.
Of course, log data for the realization of
network security
value of how much depends on two factors: first, your systems and equipment must be suitable settings for recording the data you need. Second, you must have the right tools, training and resources available to analyze the data collected.
The current
computer virus
more complex, judgment and analysis of online help for this remote, it must be analyzed using third-party software. The popular-aided analysis tools have sawmill, Hijackthis and SREng.
By professional integrity analysis log analysis tool, allowing you to get out from the sea of data, and can be in the form of a direct view of the required information WEB interface, the lifting of professional troubles.
Clear View
View certain types of logging is very simple, I manage to view Web logs, for example, click on the "Web Management Log" link, enter the log viewer page, a log file in the log file you want to view the list box selected, and then click the right side of the "View log "button, you can browse Web content management detailed logging of the.
Clear a log file is also very simple, select and the log file, click the "Clear" button. If you feel
remotely view
logs inconvenient, want
the local machine
to view it in, then you can download the log file to a local hard disk. Select a log file, and then click the "Download Log" button in the pop-up "File Download" dialog box, click on the "Save" button and specify the path to the storage.
Get Log
How to get logs?
(1)HijackThis
First download software
HiJackThis_1991_
Chinese
(standalone)
File name: HijackThis1991 [teyqiu] .exe, the file can be assured!
The method of obtaining logs: Run HijackThis1991 [teyqiu] .exe, click "scan and save the system log." In the automatic pop-up
notepad
entire content is the content in the logs.
(2) and
Step: Run the software, Smart Scan -> Scan Save -------- get LOG (log)??.
2、
2. Return to top |
3. Back to top |
4. Top |
5. Top |
1、
2、
6. Back to top |
![]() |
Author: ylbtech Source: http://ylbtech.cnblogs.com/ This article belongs to the author and blog Park total, welcome to reprint, but without the author's consent declared by this section must be retained, and given the original connection in the apparent position of the article page, otherwise We reserve the right to pursue legal responsibilities. |