Results 1 to 3 of 3

Thread: Who are you? Where do you go? What do you Want? A LOG TUT

  1. #1

    Arrow Who are you? Where do you go? What do you Want? A LOG TUT

    Provided By Anatra
    Copyright By Anatra


    In general with the term LOG is pointed out the whole operations recorded from a server or from a software: it's a log the data of access to a web site, the errors and the operations completed by a software and recorded in a file from the same program, the data introduced through keyboard and recorded by a Keylogger. As it regards the present logs on your own computer these are created from the various softwares and from the os to keep in mind of the effected operations and the errors founded. the logs that operates online (for example log of Server) the discourse becomes more complicated but the result is that when you are online something is recorded and it leaves therefore a well referable trace to your computer. In this case the log acts as a safety television camera that records what happens and it is ready to testify that you were at that time there and you were making that thing.
    You simply think that connecting yourself to a Website you will have there:

    the Log of the Server: it records the IP with which to go up again to the provider
    The Log of access of the provider: it is able to establish that to a time that IP was connected to a determined account
    The database of the call (in Italy for example TELECOM) from whose tabbed it can be known that one determined line modem has been contacted to a certain time by our telephone number.

    ERRORS AND STATISTIC

    Naturally this is not the only assignment of these small ones but jewels file: the log of a software serves to record all the errors found during the normal operations with precise references to the causes to allow the User to correct and to avoid the repeating of such errors. Besides the safety and to the control the log of server web is also finalized to hold trace of the course of a Website, of the behavior of the visitors and their preferences with the purpose to improve the service.
    Technically the logs are simple files to visualize with whatever text editor formed by called lines HIT containing numerous information. speaking of the logs of a server a line could appear as:

    2003-03-03 11:13:04 65.113.145.115 - W3SVC104NL01 62.2.53.11 80 GET/index.htmls - 404 2 3536 273 10 HTTP/1.1s mozilla/4.0+compatible+ZyB/1.0+(ZyB@WIS.com;+
    http://www.crashdown.too.it) - -

    In a log every line refers to a specific application of the user to the server for whatever necessary object to the loading of the page as the images, the downloads or other files that will singly be recorded in other lines produced in the log server.


    SOFTWARE FOR THE ANALYSIS OF THE LOG DI A SERVER WEB:

    Weblog Expert 1.51 (it is able to operate in all the versions of Win)
    URL:
    http://www.weblogexpert.com

    Advanced log Analyzer (it is able of to bring an enormous quantity of statistic data)
    Surfstats Log analyzer (it handles to create the statistics of access of the visitors in pages html and graphic)

    Both downlodables at the URL:
    http://download.com/3120-200.html?qt=log&tg=dl-20 (here you can find the downloads for software able to study and to classify every type of logs)

  2. #2
    Doc d00dz Attackin's Avatar
    Join Date
    Mar 2003
    Location
    Florida
    Posts
    661
    Hmmm, This is a nice tut about Log's.

    Great reference to lean on and look back on . Thankyou for the information Anatra..

    Cya --d00dz--
    First you listen, then you do, finally you teach.
    Duck Hunting Chat
    VirtualConvenience
    RROD

  3. #3

    Exclamation A LOG SEEN FROM NEARBY

    I insert this post to complete the precedent:

    rm258.fav.usu.edu - - [31/May/1995:09:03:23 +0600] "GET / NEI.HTTP/1.0" 302 396

    The Present fields in a line of a common log are:

    1. Identification of the Host that asks for a file from the sever Web ( rm258.fav.usu.edu )
    2. The consumer's identification in base to the username according to the RFC 931. This field is very rarely used for which is represented often by a hyphen (as all the omitted fields)
    3. Authentication of the User, used for the protected areas of the site. unless the site doesn't have a protected area from password, in this point a hyphen will appear.
    4. Time Stamp ( [31/May/1995:09:03:23 +0600] ): the date and the time when someone has asked for a file server.
    5. In demand http ( "GET / NEI.HTTP/1.0" ): it can serve to determine three things: the method used by the remote client to ask for the information, the demand file and the version HTTP of the client.
    6. The code of state (302 ) it points out if the file has correctly been sent, if it has not been found, if a copy of the cache has been used and very other.
    7. Volume of transferred data (396 ): It points out the number of Byte moved to the client to answer to the operation. in its extended version the log of access of a server web can also record the type of browser and used computer and the site of origin.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •