Miscellaneous - log: (log)

ylbtech- Miscellaneous - log: (log)

 

1. Back to top
1、

Outline

Network equipment , systems and services program, will have a call log event record at the time of the operation; each line of the log to record his description of the related operations of the date, time, user and action and so on.
Windows network operating systems are designed with a variety of log files, such as application logs, security logs , system log , Scheduler service log, FTP log, WWW logs, DNS server log, etc., these open systems based on your service different vary. When we do something on the system, these log files are usually recorded in some of our operations related content, the content is quite useful for system security staff. For example, the system was someone IPC detection , the system will quickly note the Surveyor probe when used in IP, time, user name, etc. in the security log, after probing with FTP, FTP log in will note the IP , time, user name, etc. probe used.
Of course, log data for the realization of network security value of how much depends on two factors: first, your systems and equipment must be suitable settings for recording the data you need. Second, you must have the right tools, training and resources available to analyze the data collected.
The current computer virus more complex, judgment and analysis of online help for this remote, it must be analyzed using third-party software. The popular-aided analysis tools have sawmill, Hijackthis and SREng.
By professional integrity analysis log analysis tool, allowing you to get out from the sea of ​​data, and can be in the form of a direct view of the required information WEB interface, the lifting of professional troubles.
 

Clear View

View certain types of logging is very simple, I manage to view Web logs, for example, click on the "Web Management Log" link, enter the log viewer page, a log file in the log file you want to view the list box selected, and then click the right side of the "View log "button, you can browse Web content management detailed logging of the.
Clear a log file is also very simple, select and the log file, click the "Clear" button. If you feel remotely view logs inconvenient, want the local machine to view it in, then you can download the log file to a local hard disk. Select a log file, and then click the "Download Log" button in the pop-up "File Download" dialog box, click on the "Save" button and specify the path to the storage.
 

Get Log

How to get logs?
(1)HijackThis
First download software
HiJackThis_1991_ Chinese (standalone)
File name: HijackThis1991 [teyqiu] .exe, the file can be assured!
The method of obtaining logs: Run HijackThis1991 [teyqiu] .exe, click "scan and save the system log." In the automatic pop-up notepad entire content is the content in the logs.
(2) and
Step: Run the software, Smart Scan -> Scan Save -------- get LOG (log)??.
2、
2. Return to top
 
3. Back to top
 
4. Top
 
5. Top
1、
2、
 
6. Back to top
 
warn Author: ylbtech
Source: http://ylbtech.cnblogs.com/
This article belongs to the author and blog Park total, welcome to reprint, but without the author's consent declared by this section must be retained, and given the original connection in the apparent position of the article page, otherwise We reserve the right to pursue legal responsibilities.

Guess you like

Origin www.cnblogs.com/storebook/p/11018315.html
log
log