Creation Of Log Files

View Poll Results: Have you seen Fahrenheit 9/11

Voters
26. You may not vote on this poll
  • Yes

    6 23.08%
  • No

    16 61.54%
  • Plan To

    4 15.38%
Results 1 to 5 of 5

Thread: Creation Of Log Files

  1. #1
    Junior Member
    Join Date
    May 2004
    Posts
    4

    Question Creation Of Log Files

    hello room,
    As Said in my introduction iam very much new to networking and computer security fundamentals.My Question might be very silly but pls help me out

    My Query is :--
    In my organization a log file is created whenever any user browse the net with the IP of his machine .
    I want to know how thse log files are created and can anybody mask his IP address and fool these people(networking people) i hope u cant fool the network engineer,and how do you reada particular log file

  2. #2
    Just a Virtualized Geek MrLinus's Avatar
    Join Date
    Sep 2001
    Location
    Redondo Beach, CA
    Posts
    7,324
    Very broad question. The creation of the log file depends on the OS and what is used to create the log file. Some log files are created from the firewall, some created by the OS itself, some by the routers. As for fooling the "networking people", not unless you find every potential trace/location. (which I don't recommend because it could be a reason to find a new job for the person that does try this).

    Some logs are done in plain text while others require a special reader. It all depends on what is creating the log.
    Goodbye, Mittens (1992-2008). My pillow will be cold without your purring beside my head
    Extra! Extra! Get your FREE copy of Insight Newsletter||MsMittens' HomePage

  3. #3
    Super Moderator: GMT Zone nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,190
    Hi rama~

    I may appear stupid here, but I do not see the relevance of your poll options to your question............have you got two posts mixed up?

    Cheers
    If you cannot do someone any good: don't do them any harm....
    As long as you did this to one of these, the least of my little ones............you did it unto Me.
    What profiteth a man if he gains the entire World at the expense of his immortal soul?

  4. #4
    Senior Member
    Join Date
    Aug 2003
    Posts
    1,019
    Let me see if I understand the question correctly. You are presumably on a company network. So, for the sake of argument, suppose their are twenty workstations all networked together, each having their own IP? And lets say that the boxes are assigned 192.168.0.100 to 192.168.0.120..all of a sudden, an IP shows up inside the network 126.xxx.xxx.xxx (for example)? Exactly how long do you think it would take, by process of elimination, to figure out it was you?

    Probably a weak example..still on that first cup of coffee

  5. #5
    Banned
    Join Date
    Apr 2004
    Posts
    79
    it also seems to me that if you don't own those computers, or the network that it is attached to then don't do it.... what you are talking about could mean the loss of a job...

    also those logs are put into place because employers want ot know if there employees are useing then network like they are supposed to....

    however its up to you.... its your job!!!!!!

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides