Hi every body can i transfer my logs in kerio control to another kerio control? i export my configurations of kerio and then import to another,but I connot see logs in user Interface (browser) from new kerio!

Member Avatar
+0 forum 0

If audit log is turn off on the windows server, can i use a software to generate & view the log files. If yes please suggest the tool. Regards,

Member Avatar
Member Avatar
+0 forum 3

Hi, I have this program that validates error and then logs it in a text file, but here is the problem, I want to know how show the text file that has been made after the logs have been written, for example, I have validated all the errors, and then creates a text file that has appended all the strings, then after my pop message, I want the text file to pop also, showing all the logs that have been created.. how can this be made? thanks

Member Avatar
Member Avatar
+0 forum 4

I was reviewing my IIS logs and noticed a single IP accessing the same file multiple times within seconds of each other. There are other IP addresses that do the same and cannot figure out why this is happening. This is on a closed network and thought maybe it was a Google Search indexing but they are not GSA's. One request lasted 6 mins and up to ~100 requests within that time period. Their browser agent are what a normal browser would be also. The servers are setup on a cluster with only two servers set to passive/active I believe.

Member Avatar
Member Avatar
+0 forum 4

Hello all i have created a java application which is writing to log files to specific path.logs are created successfully.When i use cat command to show the contents it is showing the correct data but when i use vi to open the file it is showing the contents like binary files. When i use file command to check the type of file it is showing that it is a binary file while i wanted to create a text file.Code is as follows [CODE]public static void logResponse(ArrayList list,String LOG_PATH) { System.out.println("Response list is"+list.toString()); String date=now(); String Filename=date+"_LogResponse.txt"; System.out.println("Filename is"+Filename); File req=new …

Member Avatar
Member Avatar
+0 forum 1

What I want to do is to take the previous day's logfile, strip out the search phrases and insert these into a mysql db. Currently using Deep Log Analyser to manually lift the search terms, but I's appreciate some pointers as to how the parsing could be done by a script running overnight. Suggestions are to where to start?

Member Avatar
Member Avatar
+0 forum 1

Hi, I downloaded Hijackthis, and ran a log. I already downloaded a couple of things, but I am unsure about most of these items. Which ones do I need to delete? Thanks Logfile of Trend Micro HijackThis v2.0.4 Scan saved at 4:06:11 PM, on 12/4/2010 Platform: Windows Vista SP1 (WinNT 6.00.1905) MSIE: Internet Explorer v8.00 (8.00.6001.18975) Boot mode: Safe mode Running processes: C:\Windows\Explorer.EXE C:\Trend Micro\HiJackThis\HiJackThis.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = [url]http://www.sony.com/vaiopeople_f08[/url] R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = [url]http://www.ask.com?o=16794S&l=dis[/url] R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = [url]http://www.sony.com/vaiopeople_f08[/url] R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = [url]http://go.microsoft.com/fwlink/?LinkId=54896[/url] R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = [url]http://go.microsoft.com/fwlink/?LinkId=54896[/url] R0 - HKLM\Software\Microsoft\Internet …

Member Avatar
Member Avatar
+0 forum 3

I just upgraded my server and now a simple log script reaks of errors. [code]#!/usr/bin/perl use CGI ':standard'; use warnings; $database = "/full_path/filename.shtml"; $shortdate = `date +"%D %T %Z"`; chop ($shortdate); open (DATABASE,">>$database"); print DATABASE "$ENV{'REMOTE_ADDR'} - $shortdate - $ENV{'SCRIPT_URI'} - $ENV{'HTTP_USER_AGENT'}<!-- - $ENV{'HTTP_REFERER'}--><BR>\n"; close(DATABASE); { print "Content-Type: text/html\n\n"; print <<EOM; <PRE> </PRE> EOM exit; }[/code] When using SSH to get the error, it spits out Use of uninitialized value in concatenation (.) or string at ebaylogs.cgi line 10. Use of uninitialized value in concatenation (.) or string at ebaylogs.cgi line 10. Use of uninitialized value in concatenation (.) or …

Member Avatar
Member Avatar
+0 forum 1

Hi everybody, first time writer, looong time follower. I've been given an assignment to write simple c++ code and make exe app out of it. It's purpose should be to check particular folder structure on running system and compare it to the some reference files and folders. Point is to see if current system configuration files are set up the way they're suppose to be according to the reference. In other words: Reference files are bunch of xml, txt, cfg and bat files located in some folder structure. I need to see if these are present and set on the …

Member Avatar
Member Avatar
+0 forum 3

Every now and then [URL="http://www.theregister.co.uk"]The Register[/URL] publishes a really funny news piece, and the one entitled 'Confused BBC tech chief' is a perfect example. According to the report, in an interview with UK based web design magazine [URL="http://www.netmag.co.uk/"].net[/URL], the Director of Future Media and Technology at the BBC, one Ashley Highfield, claimed that only 400 to 600 of the visitors to the [URL="http://www.bbc.co.uk"]BBC website[/URL] were using Linux. That's 400 to 600 out of the 17.1 million users of the site. "We have 17.1 million users of bbc.co.uk in the UK and, as far as our server logs can make out, …

Member Avatar
Member Avatar
+0 forum 2

A lot of people always ask for people to decipher their hijackthis logs and since this is a community based upon learning from one another I would like to write a little tutorial for hjt covering the basics. Now I dont claim to be some HJT master but just some best practices before resorting to asking for others help. Also including some links that could help you out. Ok first off if you dont have hijackthis or dont know what it is, simply put it is the essential malware removal tool. It is where most people turn when ad-aware and …

Member Avatar
Member Avatar
+0 forum 2

The End.