Kudremukh Trek – KoTrEsH s TrEk LoG #cdc #travel

#sugama travels
#

Location on google map:
Kudremukh trek starting point :

Trek starting point is “Mullodi”, Mullodi is very small village consisting of aprox 40 houses. This village is 6 kms from main road. This villages is not connected with any public Transport. But there are couple of home stays in this village which is ideal place for base camp for kudremukh trek.

How to reach Kudremukh trek starting point ie Mullodi :

If you are starting from Bangalore then there are few KSRTC buses and few Private Buses. Please note that No direct bus to trek starting point. You can reserve ticket in Private(Sugama Tourist) bus till Kudremukh but any way you need to get down in Kalasa and you will get connecting bus to Kudremukh. Not required to travel all the way to Kudremukh, You required to get down at “Balegal”. Balegal is 10.5 Kms from Kalasa.

If you prefer KSRTC then catch any buses which goes to “HORANADU” and get down at Kalasa. From Kalasa you get bus towords Kudremukh. Dont take ticket  to Kudremukh. Take ticket to Balegal which is small village between Kalasa and Kudremukh

To reach Mullodi from Balegal you have two options 1) Hire privite jeep from Balegal bus stop which cost you Rs 500-700 for 8 people. 2) Start your trek from Balegal itself. But first one is recommended because trek length becomes (18+6) 24KMS which is difficult task for one day.

BANGALORE  to  Kudremukh Bus details: 

Note: No direct buses to Kudremukh:  Privite bus: Sugama Travels – You will get reservation till Kudremukh but it is connecting bus

KSRTC Bus: Till Kalasa you will get bus, from there you required to catch private vehicle. Timings: AIRAVAT (VOLVO AC) :22.46,    KARNATAKA SARIGE:21:33, 22.02 RAJAHAMSA EXECUTIVE:22.26

Kudremukh trek difficulty:

Trek difficulty level from “Mullodi” to Lobo’s house trek is easy. From Lobo’s house to “Ontimara” difficulty level is Moderate. There are couple of small stretch in which trail becomes steep. From Ontimara till end of Zig-Zag route trek is bit difficult. From “Zig-Zag trail” end till peak it is again moderate  in difficulty level. Overall difficulty level is moderate

Kudremukh trek distance:

Mullodi – 4.5KMS – loboshouse – 2.5KMS – Zig-zag starting point – 1 KMS – Zig-zag end point – 1.5KMS – Peak. Total Distance is Aprox 9 to 9.5 KMS one side from Mullodi

Time to trek Kudremukh. Mullodi – 1-1.5 hrs – loboshouse – 1-1.5hrs Zig-zag starting point – 30Min-45 Min – Zig-zag end  1hrs – 1.5hours – peak. Total time required to trek from Mullodi to peak is 3.5 hrs- 5hrs

Kudremukh trek Camping sites:

camping is not allowed

Best time will be November and December where you will see complete green grass land. From Jan on words grass will turn into brownish color till march you can trek but you will not get green carpet look. But still there will be chances of getting clouds at peak. In this time you will get to see Kudremukh landscape.In summer it will be hard to trek as distance of total trek is 18KMS hence covering total distance under hot sun will be difficult. Try to avoid heavy rainy season. It will be very difficult in rains because you will land in to leaches land.





30/09/2017

Posted In: NEWS

Tags: , , , , ,

Leave a Comment

CQ Press Library, log analysis.#Log #analysis


#

log analysis

CQ Press Library – the place to search or browse resources on American government, current affairs, history, politics, public policy, and data analysis for the social sciences.

Browse all your resources

Congress Collection

A data-rich research and reference tool that provides historical analysis of members of Congress, their legislative voting behavior, interest groups, and their interactions in crafting public policy.

CQ Almanac

Authoritative analysis on the major legislation and actions of congress for each year since 1945. Unique data on the voting patterns of Congress members provide insight into the legislative process and history of the institution. Users can follow the history of a policy issue with the Policy Tracker tool which links reports on the same issue for almost 70 years.

CQ Researcher

A database of in-depth, authoritative reports on a full range of political and social-policy issues extending back to 1923. Each report is footnoted and includes an overview, background section, chronology, bibliography and debate-style pro-con feature, plus tools to study the evolution of the topic over time.

CQ Magazine

A weekly news magazine featuring in-depth reporting on public policy, politics, congressional legislation, and elections extending back to 1983, including: a complete wrap-up of news on Congress, the status of bills in play, behind-the-scenes maneuvering, committee and floor activity, debates, and all roll-call votes.

Encyclopedia of American Government

A comprehensive introduction to American government. This collection of thousands of concise, expert, explanations of the who, how and why of American democracy cover contemporary and historical topics.

Local Stats

Provides extensive social science data covering geographies within the United States and spans topics such as healthcare, crime, education, employment, religion, and government finances. Find the hard-to-locate data points you need to support your research. Visualize and compare thousands of normalized data sets to create new and interesting research avenues. Export data for greater analysis or combine with your own data to create new insights.

Political Handbook of the World

A collection of comprehensive country profiles chronicling each nation’s political history, government, leadership, elections, and political parties that includes profiles of intergovernmental organizations, development banks, and the agencies and specialized bodies of the United Nations.

Politics in America

The ultimate insider’s guide to politics with authoritative information on each member of Congress and the district he or she represents.

Public Affairs Collection

A one-stop source for public policy content with primary source documents, statistical overviews, and the best in-depth reporting on current affairs.

State Stats

Find, visualize and export state data on social and public affairs topics like health care, crime, education and more. Find data from more than 80 different sources covering more than 15 years, analyze the data as a chart, map or graphic and save your unique image or download the data to Excel.

Supreme Court Collection

A blend of historical analysis, timely updates and expert commentary of Supreme Court decisions, biographies of justices, institutional history, and the U.S. Constitution. This database also contains extensive data on Court opinions and justice voting behavior that allows for easy quantitative analysis of the Court.

Supreme Court Yearbook

A collection of annual reporting on the actions and opinions of the U.S. Supreme Court with clear, in-depth analysis of every decision made by the nation’s highest court since the 1989-1990 term and the justices who ruled on them.

U.S. Political Stats

U.S. Political Stats is a data visualization and manipulation tool that aids student researchers in finding and understanding data on the three branches of U.S. Government: Legislative, Executive, and Judicial. This powerful tool lets users compare different types of data to create datasets and visualizations that bring unique insight into the political process.

Voting and Elections Collection

A database of elections data, authoritative analyses, concise explanations, and historical materials to help researchers investigate and understand voting and elections in America from 1789-present.


10/09/2017

Posted In: NEWS

Tags: ,

Leave a Comment

How do I: Monitor a service and automatically restart it if


#

How do I: Monitor a service and automatically restart it if it stops (SCOM 2012)

1. Go to Authoring Management Pack Objects Monitors

2. Right Click Monitors Create Monitor Unit Monitor

3. As always do no save anything to the Default Management Pack, if you have a custom management pack where you want to save the monitor if now click New

4. Name your Management Pack Next

6. Windows Services Basic Service Monitor Next

7. a. Name your Monitor (I recommend the naming convention: unique prefix which should be a part of every custom rule/monitor/group-Servername-ServiceName)

b. Select a Monitor Target (Monitor Target Scope must apply to the server that contains the service you want to monitor. If you target Server 2003 and the Server that contains the service you want to monitor is Server 2008 you monitor won t work)

c. Uncheck Monitor is enabled (You do not want to leave the this checked. If you do SCOM will try to monitor for this service on all Servers based on the monitor target even if they don t contain the service you are trying to monitor. You will narrow the scope further and enable the monitor via an override once you are finished building it.)

8. If you know the name the of the Service you can just type it in, but I recommend clicking the selection button to point the monitor to the exact name of the service you want to monitor to avoid troubleshooting later on.

9. By default it will pull the available services from the management server you are running the console to see services from a different server click the button and browse to your desired server.

10. For this example I am selecting the WMI Winmgmt service

12. Generate alerts for this monitor Automatically resolve the alert when the monitor returns to a healthy state Create

13. Find your newly created monitor by searching for your custom prefix: ops-

14. Right click your new monitor Overrides Overide the Monitor For a specific object of class: Windows Server 2008 R2 Full Operating System

15. Select the specific server that you want to monitor:

16. Enabled Override Value True (This will activate this service monitor for the associated server) Apply Show Monitor Properties

17. Configure recovery tasks Add

18. Add Recovery for critical health state

21. Name Recovery Run recovery automatically Recalculate monitor state after recovery finished

22. Enter the following items Parameter will vary based on the name of the service you are trying to recover automatically.

23. Once your Override and recovery are in place schedule a time when it is ok to stop the service you are trying to monitor/recover so that you can observe the behavior to insure you made no errors as well as to see if you want to tweak the timeout.

Leave a Reply Cancel reply


23/08/2017

Posted In: NEWS

Tags: , , ,

Leave a Comment

Enabling TLS 1 #best #iis #log #analyzer


#

Enabling TLS 1.2 on IIS 7.5 for 256-bit cipher strength

So strangely enough, I always thought submitting a 2048bit CSR to my CA and receiving a 256-bit SSL cert would automatically force connections to use a 256-bit cipher strength over the established SSL connection, however it turns out that most connections will stay at 128-bit unless you tell your server to utilize TLS 1.2. In this tutorial, we will go over how to enable TLS v1.2 for IIS to increase the cipher strength to 256-bits.

Here is what a certificate s connection info looked like before the tutorial

Here is what a certificate s connection info looks like after the tutorial

  1. # Create keys in registry (not created by Windows out of the box)
    md “HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2”
    md “HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server”
    md “HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client”
    # Enable TLS 1.2 for client and server SCHANNEL communications
    new-itemproperty -path “HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server” -name “Enabled” -value 1 -PropertyType “DWord”
    new-itemproperty -path “HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server” -name “DisabledByDefault” -value 0 -PropertyType “DWord”
    new-itemproperty -path “HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client” -name “Enabled” -value 1 -PropertyType “DWord”
    new-itemproperty -path “HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client” -name “DisabledByDefault” -value 0 -PropertyType “DWord”
  2. Registry before powershell commands
  3. Registry after powershell commands
  • Next, we need to edit the server to default the use of the 256-bit ciphers
    1. Click Startgpedit.msc

    2. Expand Computer ConfigurationAdministrative Template s – Network and select SSL Configuration Settings

    3. Double click SSL Cipher Suite Order and check Enabled

    4. Copy the text from the SSL Cipher Suites and paste it into notepad.
    5. Move the following to the beginning of the text document: TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_RSA_WITH_AES_256_CBC_SHA (Note. here you could remove lower strength ciphers from the order to prevent the server from accepting those connections).
    6. Paste the Cipher Suites back into the SSL Cipher Suites box in Group Policy and click OK
    7. Restart the server for the changes to take effect
  • Post navigation

    7 thoughts on Enabling TLS 1.2 on IIS 7.5 for 256-bit cipher strength


    20/08/2017

    Posted In: NEWS

    Tags: , , ,

    Leave a Comment

    Log Analysis in Hadoop – Hadoop Online Tutorials #server #log #analysis


    #

    Log Analysis in Hadoop 5

    Table of Contents

    Log Files:

    Logs are computer-generated files that capture network and server operations data.They are useful during various stages of software development, mainly for debugging and profiling purposes and also for managing network operations.

    Need For Log Files:

    Log files are commonly used at customer’s installations for the purpose of permanent
    software monitoring and/or fine-tuning. Logs are essential in operating systems, computer networks, distributed systems and storage filers. Uses of Log File analysis are:

    • Application/hardware debugging and profiling
    • Error or Access statistics will be useful for fine tuning the application/hardware functionality For example. based on the frequency of an error message in the past 6 months, we can forecast its occurrence in the future and before it s occurrence on customer s application/hardware, if we can provide a fix for the error, then customer satisfaction will be improved which in turn business will increase.
    • Security monitoring of Application/hardware For example. if we suspect a security breach, we can use server log data to identify and repair the vulnerability.

    Log File Types:

    These log files can be generated from two types of servers Web Servers and Application Servers.

    Web Server Logs:

    Web servers typically provide at least two types of log files: access log and error log .

    • Access log records all requests that were made of this server including the client IP address, URL, response code, response size, etc.
    • Error log records all requests that failed and the reason for the failure as recorded by the application.

    For Example, logs generated by any web server like Apache logs. logs of this site hadooptutorial.info provided in the following sections of this post.

    Application Server Logs:

    These are the logs generated by applications servers and the custom logs generated by these can provide a great level of detail for application developers and analysts to understand how the application is used. Since developers can log arbitrary information, application server logs can be even larger than web server logs.

    For example, logs generated by Hadoop daemons can be treated as Application logs.

    Challenges in Processing Log Files:

    • As the log files are being continuously produced in various tiers with different types of information, the main challenge is to store and process this much data in an efficient manner to produce rich insights into the application and customer behavior. For example, A moderate web server will generate logs of size at least in GB s for a month period.
    • We cannot store this much of data into a relational database system. RDBMS systems can be very expensive and cheaper alternatives like MySQL cannot
      scale to the volume of data that is continuously being added.
    • A better solution is to store all the log files in HDFS which stores data on commodity hardware, so it will be cost effective to store huge volumes (TBs or PBs) of log files in HDFS and Hadoop provides Mapreduce framework for parallel processing of these files.

    Hadoop eco system sub components Pig, Hive support various UDF s that can be used to parse these unstructured log files and store them in structured format.

    Log File Processing Architecture:

    As hadoop supports processing of structured, semi structured and un structured data efficiently, Log files are the good real time examples of un structured data, and processing them through hadoop will be the best use case for hadoop in action.

    Below is the high level architecture of Log analysis in hadoop and producing useful visualizations out of it.

    As shown in the above architecture below are the major roles in Log Analysis in Hadoop.

    Flume Collection streaming log data into HDFS from various HTTP sources and Application Servers.

    HDFS HDFS is the storage file system for huge volumes of log data collected by flume.

    Pig Parses these log files into structured format through various UDF s.

    Hive Hive or Hcatalog will define schema to this structured data and schema will be stored in hive metastore.

    Hunk Search processing and Visualization tool that provides connectivity to Hive server and metastore and pull the structured data into it. On top it we can build various types of visualization charts. For more details on this connectivity to hive and visualizations on top of it refer the post Hunk Hive connectivity .

    Tableau It is a visualization tool that provides connectivity to Hive server. For more details on this refer the post Tableau connectivity with Hive .

    Sample Use Cases for Log File Analysis:
    • Ranked list of the most significant trends and page views over the last day/week/month
    • Identify the characteristics of the most active users to help promote this behavior across the board
    • Co-relate user sessions with transactional data to better understand how to improve sales

    In the next post, we will discuss about loading parsing web server logs and custom application logs using pig and making them structured to be ready for defining schema in hive/hcatalog.

    Share this:

    Do You need Big Data Job Support ?

    Next Spark Batch Starting From 3rd April

    Course Includes Below topics

    4. Spark Streaming

    Detailed Spark Course Contents at link http://hadooptutorial.info/spark-course-contents/

    Limited Seats available, please register by calling on +91-9704231873 (Whatsapp) and make initial payment to confirm your registration.


    17/08/2017

    Posted In: NEWS

    Tags: , ,

    Leave a Comment

    Event Log Message Files (The description for Event ID – cannot


    #

    Event Log Message Files (The description for Event ID cannot be found)

    Anybody who has used the built-in event viewer that comes with Windows more than once, has probably seen the message The description for Event ID ( 50 ) in Source ( SomeService ) cannot be found. The local computer may not have the necessary registry information or message DLL files to display messages from a remote computer. when viewing certain events. This message occurs more often when viewing events on a remote event log, but it appears often enough on the local machine as well.

    I will explain this dubious error message here, but before I do I will explain how messages are in fact logged to the event log. After reading this you should have a much clearer picture about how applications log to the event log and how you go about troubleshooting this error .

    The framework that Microsoft created for the event log, back in the NT 3.51 days, was actually quite sophisticated in many ways especially when compared with the more simplistic Syslog capabilities (though Syslog still has some unique features).

    A key feature of event logging in Windows is the fact that an application, at least when using the event log framework in the way it was intended to be used, will never actually directly write the actual message to the event log instead it will log only the event source and event id, along with some properties such as category and insertion strings. The framework also supports multiple languages, so if you open an event on a French Windows, then the event will display in French (of course assuming that the message file from the vendor supports that) instead of English.

    Let s look at an example using EventSentry to understand this better. When EventSentry detects a service status change, it will log the event 11000 to the event log that reads something like this:

    The service Print Spooler (Spooler) changed its status from RUNNING to STOPPED.

    When EventSentry logs this event to the event log, you would expect that the application does (in a simplified manner) something like this:

    LogToEventLog( EventSentry ,
    101000, The service Print Spooler (Spooler) changed its status from RUNNING to
    STOPPED. );

    However, this is NOT the case. The application logging to the event log never actually logs the message to the event log, instead the application would log something similar to this:

    LogToEventLog( EventSentry ,
    101000, RUNNING , STOPPED );

    (Note that the above example is for illustration purposes only, the actual code is somewhat more complicated)

    So, our actual string from the event message is nowhere to be found, and that s because the string is embedded in what is referred to as the Event Message File . The event message file contains a list of all events that an application could potentially log to the event log. Here is what an event message file looks like before it is compiled:

    MessageId=10100
    SymbolicName=EVENTSENTRY_SVC_STATUSCHANGE
    Language=English
    The status for service %1 (%2) changed from %3 to %4.
    .
    Language=German
    Der Dienststatus von Dienst %1 (%2) aenderte sich von %3 auf %4.
    .

    Notice the numbers contained in the string that start with the percentage sign. These are placeholders for so-called insertion strings. and they make it possible to make the event log message dynamic, since an application developer can t possible account for all imaginable error message or information that might be accumulated during the runtime of the application. For example, an application might log the name of a file that is being monitored to the event log, clearly this can t be embedded into the event message file.

    Instead, the application can insert strings (hence, insertion strings) into the event message during run time. Those strings are then stored in the actual event log, along with all the other static properties of event, such as the event id and the event source.

    Event message files are usually DLL files, but event resources can also be embedded in executables as is the case in EventSentry. where all events are contained in the eventsentry_svc.exe file. This is generally a good idea, since it reduces the number of files that have to be shipped with the software and it also prevents you from losing the message DLL.

    You can browse through all embedded events in a message file by using the event message browser that is included in the free EventSentry SysAdmin Tools which you can download here. Simply launch the application, select an event log (e.g. Application), select an event source (e.g. EventSentry), and browse through all the registered event messages, sorted by the ID.

    So now that we know how Windows handles event messages internally, we can go back to the original problem: The description for Event ID ( 50 ) in Source ( SomeService ) cannot be found. . The Windows Event Viewer logs this message for one of the following reasons:

    * No message file is registered for the source (e.g. SomeService)
    * The registered message file does not exist or cannot be accessed
    * The specified event id is not included in the message file

    If the message file is not registered, then this is probably because the application wasn t installed correctly, or because it has already been uninstalled by the time you are trying to view the event message. For example, if the event message was logged before the application was uninstalled, but you are viewing the event after the application was uninstalled, then you will see this message.

    If the event you are trying to view is important, then you can try to fix the problem yourself by either fixing the registry entry or locating the missing event message file.

    The registry location depends on only two factors: The event log [EVENTLOG] the event was logged to as well as the event source [EVENTSOURCE].

    (Replace [EVENTLOG] and [EVENTSOURCE] with the respective values, and view/add/edit the value EventMessageFile. This is the value that points to the message file)

    If this value doesn t exist, then you can add it as either a REG_SZ or a REG_EXPAND_SZ value. You can specify multiple message files with a semicolon.

    If the message file specified in the value doesn t exist, then you can simply copy it into the appropriate location assuming you can get a hold of it that is :-). Oracle is notorious for not including the message file, in particular with the Express Edition.

    A final note on message files for those of you haven t had enough yet: You can use message files not only to translate event messages, but also for categories, GUIDs and more. Some of the values you might find (mostly in the security event log) are CategoryMessageFile, GuidMessageFile and ParameterMessageFile.

    Well, this article turned out a lot longer than I had anticipated, but hopefully you will have a better understanding as to why this message is logged and what you can do about it.

    8 thoughts on Event Log Message Files (The description for Event ID cannot be found)

    April 28, 2008 at 9:26 am

    I get to know the reason of Event Log being existed in Windows OS.
    This article is, in fact, written in a comprehensible way.
    Cheers!!

    October 21, 2008 at 10:38 am

    Great article. Everything is explained in detail but also in a very easy to understand way. It really help me find what was going wrong with my app.
    Keep up the great work.

    November 19, 2009 at 5:40 am

    on my system (XP) this works only if the MessageFile is under
    %SystemRoot%\SYSTEM32. Didn t find that documented anywhere.

    January 22, 2010 at 7:39 am

    Thanks for the information. It has been very useful because I had a Windows XP Embedded with some event id without description.

    April 19, 2011 at 10:26 am

    All I have been using message files for was translating event messages. Now I know there are a lot more features to be explored. Thanks!

    May 9, 2011 at 9:36 am

    Another note of appreciation for an informative, well-written and useful article.

    May 26, 2011 at 4:15 am

    I was not sure that adding the new value would work but there seems to be no problem. Thanks for the clean solution.

    June 29, 2011 at 8:59 am

    ok, The NTToolKit was exactly ewhat i m looking for thanks

    Leave a Reply Cancel reply

    You must be logged in to post a comment.


    04/08/2017

    Posted In: NEWS

    Tags: , ,

    Leave a Comment

    My favorite Windows Event log tools – 4sysops #event #log #tool,event


    #

    My favorite Windows Event log tools

    Contents of this article

    You probably know Event Viewer, a baked in Windows tool. For sophisticated event log analysis, you often need additional tools. Some of the tools discussed here are applications, and some are websites.

    EventID.NET ^

    I have a paid subscription for EventID.NET. and use this database for event ID searches. The site is a repository of almost all Windows event IDs and offers in-depth write ups, screenshots, and links to external sources. A one year subscription for an individual costs $29 USD.

    EventID.net -Search for event IDs

    ServerFault.com ^

    The consistently useful ServerFault.com website has served me well since its inception. It is a crowd-sourced community of experts based on a Digg type voting system, in which a poster asks questions based on issues they are confronted with, usually scenario based, with Event IDs.

    ServerFault.com – Question and answer site for admins

    Experts-Exchange.com ^

    Experts-Exchange.com is another community site which is not limited to any platform or architecture. It has a similar voting system as Serverfault.com and issues awards based on the helpfulness of the “experts”.

    Notice that Experts-Exchange.com is not free. After the 30-day free trial, prices vary from $12.95 USD for the monthly plan to the the two year plan for $189.95 USD.

    Experts-Exchange.com – Tech support from experts

    ManagEngine EventLog Analyzer ^

    I have used many of ManageEngines free tools, and EventLog Analyzer is my favorite. The tool works with Unix/Linux/Windows and can be configured to give real time alerts and offers sophisticated reporting features. The holy grail of all IT logging is the centralized logging ability. EventLog Analyzer can also collect logs from devices such as routers, web services and FTP servers. The free version supports up to 5 hosts. The Professional Edition starts at $395 USD for 10 hosts. Check out the price list for other configurations.

    Eventlog tool ManageEngine EventLog Analyzer

    GFI EventsManager ^

    GFI EventsManager provides similar features as the ManageEngine product offering real time alerts and support for SNMPv2 traps. I like the auto archive feature and its search filters. GFI doesn’t offer a free edition but you can download a free trial. For a Server and 10 clients, GFI EventsManager costs $440 USD.

    Event log tool GFI EventsManager

    Netikus.net EventSentry ^

    EventSentry offers quite a few interesting features that go far beyond event log monitoring and analysis: Compliance tracking, package managing, compliance tracking, log file monitoring, system health monitoring, and web reports. EventSentry Light is its free version and is a must-have tool for every admin doing event log analysis. Check out the comparison table to get an overview of the capabilities for its free and full version. A configuration with 10 hosts will cost you $698 USD. The complete price list can be found here .

    Event log tool – Netikus.net EventSentry

    Do you know any other good event log analysis tool?

    Reviews

    • ManageEngine Password Manager Pro v9 – A lightning-fast new user interface Thu, Jun 1 2017
    • Zoho Vault – Online password manager for personal and enterprise use Tue, May 23 2017
    • Condusiv SSDkeeper – Extend longevity of server SSDs Wed, May 17 2017
    • FileAudit – Easy-to-use file and folder auditing Tue, May 16 2017
    • NAKIVO Backup Replication v7 now supports Hyper-V backup Wed, May 3 2017
    • FolderSecurityViewer: Quick and easy NTFS permissions analyzer Wed, Apr 19 2017
    • Free backup for Hyper-V and vSphere – Vembu VMBackup Tue, Apr 4 2017

    Popular Posts

    • Office 2016 installation Tue, Nov 10 2015
    • Disable Windows 10 Update in the Registry and with PowerShell Mon, Aug 17 2015
    • Automatically log off idle users in Windows Thu, Mar 26 2015
    • The PowerShell function – Parameters, data types, return values Thu, Feb 12 2015
    • Reset a Windows 10 password Thu, Oct 30 2014
    • Disable Windows Update in Windows 10 Mon, Oct 13 2014
    • Use DISM to slipstream updates Fri, Mar 21 2014
    • Managing inactive clients in SCCM 2012 Wed, Oct 16 2013

    Forum Topics


    02/08/2017

    Posted In: NEWS

    Tags: , , , ,

    Leave a Comment

    Billview Phone Bill Customer Service #payment #processing, #payment #processing #services, #payment


    #

    Billview Phone Bill Customer Service

    Let Us Help You with Your Phone Bill

    Welcome to Billview.com, your online resource to help you with your phone bill. BSG understands phone bills can be difficult to navigate, so let us help you identify items, charges and transaction types which are provided to you by your telephone company. BSG provides phone billing services enabling consumers to make purchases at authorized online stores, service providers and telecommunications companies, and pay later on their home phone bill.

    How To Research Purchases Made with Your Phone Bill

    When you make a purchase or sign up for services at authorized online stores, service providers and telecommunications companies, you will receive one of the following inserts (click to view): E NABILL. ESBI. HBS. OAN. USBI and ZPDI in your phone bill. The phone bill insert will have details on the purchase, the service provider where the purchase was made and charge information. Learn more about BSG s phone billing services and our program to protect consumers from unauthorized charges on home phone bills.

    Contact Our Customer Service Team Now

    Click on one of the phone billing service for details, and then contact us online or by calling for assistance. Our team is ready to help you research charges, provide contact information and details on the service provider where the purchase was made and help you resolve issues with your bill.

    BSG s customer service team is available 7a – 9p Central time, Monday – Friday. You can also fill out an online Customer Service Inquiry. We will respond to your request within 4 business days.

    Your Phone Bill Insert Page


    28/07/2017

    Posted In: NEWS

    Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

    Leave a Comment

    Learn How to Analyze and Manage Windows Security Logs #windows #security


    #

    Analyze and Manage Windows Security Logs

    Q: How much log data can be sent to Nagios Log Server?

    A: We don’t cap the amount of log data that is sent to Nagios Log Server. Instead, the limit for the amount of log data that can be handled is based on the physical hardware of the Nagios Log Server instances.

    Q: What is an instance? Why would I want one?

    A: Nagios Log Server systems are based on a clustering model. Each server in the cluster is called an instance. Adding instances to your cluster allows for data redundancy and a balanced workload.

    Q: Is there a Free Edition of Nagios Log Server?

    A: Yes! Nagios started in the Open Source community and we hold strong to our roots. Nagios Log Server is free to use for up to 500MB of log data per day. This makes it easy to monitor small environments or to try it in your environment before you make a purchase decision.

    Q: What types of logs can be sent to Nagios Log Server?

    A: Right out-of-the-box, Nagios is configured to be able to receive Windows Event Logs, Linux Syslogs, and Network Device Syslogs – as well as log information from any Windows and Linux machine. Additional log types can be added through the convenient GUI configuration wizard.

    Pricing

    Nagios Log Server, unlike many of our competitors, allows you to have full access to all of your log data no matter your license level. We don’t believe in charging you for your own data. We don’t think it’s fair. Your only limitation is the hardware/VM that you put Log Server on, but with Log Server’s ability to quickly scale to your environment, your monitoring needs are always met. Get started with Nagios Log Server today at the exclusive introductory price of only $1995.

    Licensing Model

    Nagios Log Server is licensed based on the number of cluster instances you implement in your environment. A Nagios Log Server system is comprised of any number of cluster server instances. Each instance communicates with each other to both replicate/backup your data and load-balance your system to maintain an efficient log monitoring system.

    Top-notch Technical Support

    Nagios Log Server customers receive access to top-notch technical support via our exclusive customer-only support forum and included email support incidents. In addition, you may add a phone support package to ensure access to priority support services when you need them most.

    Distribution Formats

    Nagios Log Server is officially distributed in multiple formats including VMware virtual machine images for VMware Player, Workstation, ESX, or vSphere. Source installers are also available for installation to physical Linux servers running RHEL and CentOS.

    Try Log Server Today

    Nagios Log Server allows you to manage your windows task manager logs and security log data for in-depth log analysis and alerting.


    15/07/2017

    Posted In: NEWS

    Tags: , , , , , , , ,

    Leave a Comment

    Travel Log (Internet Explorer) #arc #travels

    #travel loge
    #

    Travel Log

    This section describes Travel Log technology. The travel log interfaces are designed for use by an application which hosts a WebBrowser Control. Use the travel log interfaces to design applications that improve and enhance the user’s travel log experience. The following list gives some examples of features you may include.

    • Enumerating the travel log (forward and back).
    • Navigating to specific entries in the travel log.
    • Deleting and adding entries which meet certain criteria.
    • Marking an entry in the travel log and then displaying the entry in red.
    • Associating properties with entries in the travel log.
    • Retrieving information about the state of the travel log. For example, you could show the previous five pages visited.
    • Setting and retrieving custom data concerning entries in the travel log through IPropertyBag .

    All the travel log interfaces act on existing data. That means that when you add or remove an entry, the change is propagated to all the methods that use the travel log (navigation stack), such as DHTML IOmHistory::back . IOmHistory::forward and IOmHistory::go .

    The topmost entry in the travel log will not contain complete information until the user has navigated away from the page at least once. For example, if a user navigates to www.fabrikaminc.com and then to fabrikaminc.fabrikam.com, and a call is made to ITravelLogStg::GetRelativeEntry . the entry will not be complete. An entry is not complete until the user leaves a site—navigates from www.awesomecomputers.com to www.hansonbrothers.com, for instance—or until the user clicks the back button and then the forward button.

    The following topics contain the Travel Log technology reference.





    04/04/2017

    Posted In: NEWS

    Tags: , , ,

    Leave a Comment