An Eprints Apache Log Filter for Non-Redundant Document Downloads by Browser Agents
|
|
|
- Lynne Hodge
- 10 years ago
- Views:
Transcription
1 An Eprints Apache Log Filter for Non-Redundant Document Downloads by Browser Agents Ed Sponsler Caltech Library System December, 2004 Contents 1 Abstract 1 2 Processing Apache Log Files Human vs. Robot Access Scripts Processing Algorithm Document File Format Successful Downloads Removing Redundancy Obtaining Document Metadata Preparing Output for Web Analysis Software Script I/O Script Shell Script for Batch Processing Generating Statistical Reports Accesses vs. Submission Date Scatter Plot Growth per Month AWstats and other Web Analysis Software Geographical Analysis Archive Growth Quality Control 9 1 Abstract Web log files record a vast amount of information and much of it just gets in the way of meaningful observational studies on usage. It is therefore necessary to filter out the junk in a deliberate way before making statements on how the web is being used. 1
2 This report describes the methods and scripts used to accomplish apache web log filtering and report generation. It is open to scrutiny and freely available for others to use. These methods were used to generate reports presented at the following conferences. Attendees at these conferences may be curious to know exactly how the data were generated, and that is the purpose of this report. Doglas, Kim. (2004) Keynote: Experiences and Challenges. International Conference on Developing Digital Institutional Repositories, Hong Kong. Van de Velde, Eric. (2004) CODA, an Eprints Open Digital Archive. International Conference on Developing Digital Institutional Repositories, Hong Kong. Sponsler, Ed. (2004) Caltech ETD Collection Analysis: Who Accesses What and Why? The 7th International Symposium on Electronic Theses and Dissertations, U. of Kentucky. 2 Processing Apache Log Files This study analyzes Apache combined format log files generated by various versions of Eprints 1 and Virginia Tech ETD-db 2 software. 2.1 Human vs. Robot Access For the purposes of these observational studies, only log entries generated by web browsers are interesting. Known web browsers may be identified by the agent identifier recorded in the apache log. Several resources on the web catalog Agent IDs 3. The ZyTrax source is useful since each browser Agent ID is explained in detail, giving us some confidence that these strings indicate browsers and not robots. Once a list of known browser Agent IDs is prepared it may be used by a script to cull the log entries matching one of the known browser agent identifiers Scripts The browser Agent ID list is prepared by extracting the identifier strings from the other text in the html file, outputting these identifiers to a text file. The utility wget is used to obtain the source html from ZyTrax. The filter script parse-browser-ids.pl goes through the trouble of sorting the browser strings so that artifacts caused by human error in the html code float to the top. Examples of these artifacts are strings which begin with a space or contain misplaced tags. These are easy enough to edit by hand prior to using the list by another script to parse a log file. The log parsing script split-human-robot.pl produces three output files: log entries which match a browser agent ID (access-log-human), those which don t (access-log-robot) and those which do not contain an Agent ID (access-log-no-agent). In this way all of the original log entries may be found in one of these three files. The script also sends access-log-human to stdout to support piping the data to another script. Usage: $ wget $./parse-browser-ids.pl < browser_ids.htm > browser-ids.dat [Fix possible artifacts in browser-ids.dat] Script: parse-browser-ids.pl See ZyTrax: ids.htm; PGTS: and Psychedelix: 2
3 #!/ usr / bin / p e r l w my (% b r s t r s, $ b r s t r ) ; while (<>) { $ b r s t r s {$1=0 i f (m g c [ sn ] >(.?)</p> ) foreach $ b r s t r ( sort keys % b r s t r s ) { print $ b r s t r \n ; Script: split-human-robot.pl #!/ usr / bin / p e r l w open (ROBOT, >a c c e s s l o g robot ) die ; open (HUMAN, >a c c e s s l o g human ) die ; open (ERROR, >a c c e s s l o g noagent ) die ; open ( IDS, <browser i d s. dat ) die ; my (% i d s, $id ) ; my $match=0; while (<IDS>) {chomp ; $ i d s { $ =1; while (<>) { i f (/.+\ s (.+) $ / ) { foreach $id ( keys % i d s ) { $match=1 i f ( $id eq $1 ) ; else { print ERROR; i f ( $match ) { print ; print HUMAN; $match =0; else { print ROBOT; 3 Processing Algorithm The following algorithm is used after the logs have been filtered of robots. The main script also filters the logs based on the other parameters described in this section. 1) Read the next line of the log file 2) Store the IP number if it is the first time we have seen it, otherwise goto 4). This list of IPs is used to generate Geographical Analysis. 3) Extract the month/year from the log and add one to a counter tracking the number of times step 2) has been true for this month. This data is used in the Usage Chart to show the number of first time visitors. 4) Extract the record identifier and IP. If this combination has never been seen before then store the combination as well as the log line itself, otherwise goto 1). The number of IPs associated with the same record identifier is calculated and provides the range (y axis) in the Scatter Plot. The log lines collected at this step become the raw material used by AWstats to produce the web stats pages. 5) Extract the month/year and add one to the counter tracking the number of times step 4) has been true for this month. This data is used to create downloads/month in the Usage Chart. 6) Goto 1) 3.1 Document File Format Document file types of interest are isolated from the logs by matching filenames with known file format extensions such as.pdf and ps. Files having other extensions such as.htm,.gif or.png are ignored. 3
4 3.2 Successful Downloads Log entries are discriminated based on http status code. Successful codes are accepted for analysis, others are ignored. Accepted codes are: 200 (OK), 206 (partial content) and 304 (not modified). All others are ignored, such as: 403 (forbidden), 404 (file not found) and 500 (internal server error) Removing Redundancy A redundant download is defined as a host accessing the same record more than once. It is possible to remove these from the log file by storing the set of host IPs that have accessed each record and rejecting subsequent log entries whose source IP matches one in the list. This process is important since it removes uninteresting log entries from analysis. There are many ways redundancy is introduced in log files. It is common for a web server to chop a large document up into smaller chunks prior to downloading to the browser. When this happens a single download event appears misleadingly as multiple downloads in the log file. There may also be cases in which a robot agent masquerades its identifier as one on the known browser list or a user may return to the server multiple times to download the same document rather than store a local copy. Removing redundancies is a simple way to control for these confounding influences. 3.4 Obtaining Document Metadata A scatter plot of document downloads over submission date provides a qualitative picture of the archive s activity. The submission date is obtained by querying the archive database using the identifier parsed from the apache log. It is useful to obtain other record metadata as well, such as title and URL. 3.5 Preparing Output for Web Analysis Software One of the files produced by the following script is a chronologically ordered, filtered log file for processing by other software such as AWstats Script I/O The script takes an Apache log in combined format as input. After filtering, it outputs: 1) first time accesses in apache log format to NON REDUNDANT LOGS; 2) redundant accesses to REDUNDANT LOGS; 3) logs which don t match a legitimate access regular expression to ILLEGITIMATE LOG; 4) a table of the number of non-redundant accesses per document, including the document s submission date and title to COUNT RECORD; 5) a table of the number of accesses and number of new visitors per month to COUNT MONTHLY; 6) a complete list of ip numbers that have downloaded at least one document to ALL IPS; 7) a list of record identifiers missing from the archive database to MISSING ID. The script ensures that every log line, unexpected regular expression mismatches and missing record identifiers end up in appropriate output files Script This is the main perl script 6 Script: filter-apache.pl 4 More info on http status codes: Download: 4
5 #!/ usr / bin / p e r l w # f i l t e r apache. pl # by Ed Sponsler, December, # e ds@library. c a l t e c h. edu use Time : : Local ; use DBI ; ####################### # BEGIN C o n f i g u r a t i o n # ####################### my $db name = databasename ; my $db user = user ; my $db pass = password ; open (NON REDUNDANT LOGS, >a c c e s s l o g non redundant ) ; open (REDUNDANT LOGS, >a c c e s s l o g redundant ) ; open ( ILLEGITIMATE LOGS, >a c c e s s l o g i l l e g i t i m a t e ) ; open ( ALL IPS, > a l l i p s. dat ) ; open (COUNT MONTHLY, >count monthly. dat ) ; open (COUNT RECORD, >count record. dat ) ; open ( MISSING ID, >count record. e r r ) ; # Regular Expression Numbered V a r i a b l e s # $1 = IP # $2 = day # $3 = month # $4 = year # $5 = hour # $6 = minute # $7 = second # $8 = record id ####################################################################### # NOTE: Each r e g u l a r e x p r e s s i o n should be one long l i n e! They have been # t y p e s e t as shown in order to f i t on the page. You w i l l need to j o i n # the l i n e s making one long l i n e per r e g u l a r e x p r e s s i o n assignment p r i o r # to running the s c r i p t. ####################################################################### my $ r e 1 = qr ˆ(.+?)\ s.+\[(\ d+)/(\w+)/(\d +):(\ d +):(\ d +):(\ d+)\s.+/ a r c h i v e /0 ([1 9]\ d )/\d+/.+?\.( pdf ps PDF PS)\ s.+?\ s ( ) \ s.+$ ; my $ r e 2 = qr ˆ(.+?)\ s.+\[(\ d+)/(\w+)/(\d +):(\ d +):(\ d +):(\ d+)\s.+/\d+/\d+/\d+/\d+ /0 ([1 9]\ d ) \d+/.+?\.( pdf ps PDF PS)\ s.+?\ s ( ) \ s.+$ ; 5
6 my $ r e 3 = qr ˆ(.+?)\ s.+\[(\ d+)/(\w+)/(\d +):(\ d +):(\ d +):(\ d+)\s.+get\s /(\d+)/\d+ /.+?\.( pdf ps PDF PS)\ s.+?\ s ( ) \ s.+$ ; ##################### # END C o n f i g uration # ##################### my %mon 1 = ( Jan=> 0, Feb=> 1, Mar=> 2, Apr=> 3, May=> 4, Jun=> 5, Jul=> 6, Aug=> 7, Sep=> 8, Oct=> 9, Nov=> 1 0, Dec=> 1 1 ) ; my %mon 2 = ( Jan=> 0 1, Feb=> 0 2, Mar=> 0 3, Apr=> 0 4,May=> 0 5, Jun=> 0 6, Jul=> 0 7, Aug=> 0 8, Sep=> 0 9, Oct=> 1 0, Nov=> 1 1, Dec=> 1 2 ) ; # # Process Each Line o f the Apache Log F i l e # while (<>) { i f ( ( $ = $ r e 1 ) ( $ = $ r e 2 ) ( $ = $ r e 3 ) ) { $month= $4 $mon 2{$3 01 ; $months represented {$month = 1 ; # count non redundant a r c h i v e v i s i t s per month i f (! exists $ a l l i p s {$1 ) { $ a l l i p s {$1 =1; i f ( exists $ c o u n t n o n r e d u n d a n t v i s i t s {$month ) { $ c o u n t n o n r e d u n d a n t v i s i t s {$month += 1; else { $ c o u n t n o n r e d u n d a n t v i s i t s {$month = 1; # s t o r e non redundant record a c c e s s l o g s i f (! exists $ n o n r e d u n d a n t r e c o r d a c c e s s e s {$8 { $1 ) { $ n o n r e d u n d a n t r e c o r d a c c e s s e s {$8 { $1 =1; $ e p o c h s e c s = t i m e l o c a l ( $7, $6, $5, $2, $mon 1{$3, $4 ) ; $ l o g s { $ e p o c h s e c s = $ ; # and then count non redundant record a c c e s s e s per month i f ( exists $ c o u n t n o n r e d u n d a n t a c c e s s e s {$month ) { $ c o u n t n o n r e d u n d a n t a c c e s s e s {$month += 1; else { $ c o u n t n o n r e d u n d a n t a c c e s s e s {$month = 1; else { print REDUNDANT LOGS; else { print ILLEGITIMATE LOGS; # # Output Reports # # monthly t o t a l s $accesses sum = 0 ; 6
7 $ v i s i t s s u m = 0 ; print COUNT MONTHLY MONTH\tACCESSES\tACCESSES SUM\ tvisits\tvisits SUM\n ; foreach $month ( sort keys % months represented ) { $accesses sum += $ c o u n t n o n r e d u n d a n t a c c e s s e s {$month ; $ v i s i t s s u m += $ c o u n t n o n r e d u n d a n t v i s i t s {$month ; print COUNT MONTHLY $month\ t $ c o u n t n o n r e d u n d a n t a c c e s s e s {$month\ t. $accesses sum \ t $ c o u n t n o n r e d u n d a n t v i s i t s {$month\ t $ v i s i t s s u m \n ; # a l i s t o f a l l the IPs foreach $ip ( sort keys % a l l i p s ) { print ALL IPS $ip \n ; # non redundant l o g s f o r a n a l y s i s by AWstats, webalyzer, e t c. foreach $ e p o c h s e c s ( sort keys % l o g s ) { print NON REDUNDANT LOGS $ l o g s { $ e p o c h s e c s ; # record t o t a l s with t i t l e and submission date $dsn = DBI : mysql : database=$db name ; $dbh = DBI >connect ( $dsn, $db user, $db pass, { RaiseError => 1); print COUNT RECORD UID\tSUB DATE\tDOWNLOADS\tTITLE\n ; foreach $id ( sort keys % n o n r e d u n d a n t r e c o r d a c c e s s e s ) { $ c o u n t i p s = scalar ( keys %{ $ n o n r e d u n d a n t r e c o r d a c c e s s e s { $id ) ; $ s q l = SELECT datestamp, t i t l e from a r c h i v e where e p r i n t i d = $id ; $sth = $dbh >prepare ( $ s q l ) ; $sth >execute ; $sth >bind columns ( \ ( $sdate, $ t i t l e ) ) ; i f ( $sth >f e t c h ) { print COUNT RECORD $id \ t $ s d a t e \ t $ c o u n t i p s \ t $ t i t l e \n ; else { print MISSING ID Record ID : $id not found! \ n ; 3.7 Shell Script for Batch Processing In this example, Apache logs are rotated weekly into a special directory and gziped. The directory name is determined by a short string representing the archive, such as cstr for the Computer Science Technical Reports archive. Given this string as its only argument, the shell script knows where to find the Apache logs for that archive and what to name the various output files. The shell variable DATA stores the path where you would like to store the output files and LIB is the path to the scripts. Be sure split-human-robot.pl is able to find browser-ids.dat. Usage: $./get_log_proc.sh cstr #!/ bin / bash # g e t l o g p r o c. sh # S h e l l s c r i p t f o r p r o c e s s i n g apache l o g f i l e s DATA=/home/ e p r i n t s / p r o j c o d a a n a l y s i s / c u r r e n t / l o g p r o c / output LIB=/home/ e p r i n t s / p r o j c o d a a n a l y s i s / c u r r e n t / l o g p r o c / l i b f i n d / var / log / httpd /$1/ a r c h i v e / name a c c e s s l o g \ xargs gunzip c $LIB/ s p l i t human robot. nov2004. pl \ $LIB/ f i l t e r apache. nov2004. pl 7
8 mv a c c e s s log human $DATA/$1. human mv a c c e s s log robot $DATA/$1. robot mv a c c e s s log noagent $DATA/$1. no agent mv a c c e s s log i l l e g i t i m a t e $DATA/$1. i l l e g i t i m a t e mv a c c e s s log non redundant $DATA/ $1. non redundant mv a c c e s s log redundant $DATA/ $1. redundant mv a l l i p s. dat $DATA/$1. a l l i p s mv count monthly. dat $DATA/ $1. count monthly mv count record. dat $DATA/$1. count record mv count record. e r r $DATA/$1. count record. e r r 4 Generating Statistical Reports At this point we have various output files useful in generating charts or further analysis by other applications such as AWstats. The underlying theme for all the data is to count only document downloads by humans (web browsers) and in which any host IP may download a particular record only once. 4.1 Accesses vs. Submission Date Scatter Plot In this view, the number of accesses per document is plotted over the date of submission to observe the archives activity. To generate this report, import the data from the count-record.dat file into Excel and create a scatter plot using the submission date as the x-axis and access count per record as the y-axis. 4.2 Growth per Month This data is contained in count- How many documents are submitted per month into each archive? monthly.dat. 4.3 AWstats and other Web Analysis Software Web analysis software packages such as AWstats may use any of the various apache log output files: accesslog-human, access-log-robot or access-log-non-redundant. 4.4 Geographical Analysis The all-ips.dat file is useful if your are interested in knowing where your users are coming from. A neat utility called geoip-lookup is freely available as perl module 7. This database associates IPs number ranges with the registrant, such as which country the IP registrant is located. Once the perl module is installed and database is downloaded, the following simple script will turn your list of IP numbers (all-ips.dat) into a table of number of accesses per country. #!/ usr / bin / p e r l w while(<>) { $country = geoip lookup l $ ; chomp ( $country ) ; i f ( exists $ c o u n t i p { $country ) { $ c o u n t i p { $country +=1; else { $ c o u n t i p { $country =1; 7 8
9 foreach $country ( sort keys % c o u n t i p ){ print $country \ t $ c o u n t i p { $country \n ; 4.5 Archive Growth Another way to look at archive activity is to chart the number of deposits made per month. This has nothing to do with Apache log files, but can be used together with these other reports. The following script simply looks up all of the datestamp values in each of the supplied eprints databases and produces a report of the number of deposits per month. It takes no input and outputs to stdout. You will of course need to supply the eprints database names, user and password. #!/ usr / bin / p e r l w use DBI ; = ( e p r i n t s database1, e p r i n t s database2 ) ; my $db user = user ; my $db pass = password ; foreach $db ) { $dsn = DBI : mysql : database=$db ; $dbh = DBI >connect ( $dsn, $db user, $db pass, { RaiseError => 1); $ s q l = s e l e c t datestamp from a r c h i v e ; $sth = $dbh >prepare ( $ s q l ) ; $sth >execute ; $sth >bind columns ( \ ( $sdate ) ) ; while ( $sth >f e t c h ) { i f ( $sdate = /(\ d+ \d+) \d+/) { i f ( exists $dat {$db{ $1 ) { $dat {$db{ $1 += 1; else { $dat {$db{ $1 =1; foreach $sdate ( sort keys % s d a t e s ) { print ${ sdate 01\ t $ s d a t e s { $sdate \n ; foreach $db ( sort keys %dat ) { print \ t$db ; foreach $db ( sort keys % dat ) { foreach $sdate ( sort keys %{$dat {$db ) { $dates { $sdate =1; foreach $date ( sort keys % dates ) { print \ n$date ; foreach $db ( sort keys % dat ) { i f ( exists $dat {$db{ $date ) { print \ t$dat {$db{ $date ; else { print \ t0 ; print \n ; 5 Quality Control It is important to survey the output files to fully appreciate what the scripts are doing. Every possible outcome is accounted for in the output files. Every log file inputed will find a home in one of the various 9
10 output log files. All mismatch errors and errors in sql database lookups end up in one file or another. After you run the scripts, glance over all of the output files to discern the legitimacy of this method to accurately describe the observational reports. 10
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8
Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007
Analysis One Code Desc. Transaction Amount. Fiscal Period
Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00
Statistics for www.brageboden.se (2008-08)
Statistics for www.brageboden.se (-08) Sida 1 av 5-08-10 Last Update: 10 Aug - 10:39 Reported period: Aug OK Summary Reported period Month Aug First visit 01 Aug - 02:19 Last visit 10 Aug - 07:08 Unique
Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017
From -JAN- To -JUN- -JAN- VIRP Page Period Period Period -JAN- 8 -JAN- 8 9 -JAN- 8 8 -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -FEB- : days
Domain Name Abuse Detection. Liming Wang
Domain Name Abuse Detection Liming Wang Outline 1 Domain Name Abuse Work Overview 2 Anti-phishing Research Work 3 Chinese Domain Similarity Detection 4 Other Abuse detection ti 5 System Information 2 Why?
DiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com [email protected] 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
Deep Security Intrusion Detection & Prevention (IDS/IPS) Coverage Statistics and Comparison
Deep Security Intrusion Detection & Prevention (IDS/IPS) Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security. The document also outlines a comparison
Deep Security/Intrusion Defense Firewall - IDS/IPS Coverage Statistics and Comparison
Deep Security/Intrusion Defense Firewall - IDS/IPS Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security and Intrusion Defense Firewall. The document
Application note: SQL@CHIP Connecting the IPC@CHIP to a Database
Application note: SQL@CHIP Connecting the IPC@CHIP to a Database 1. Introduction This application note describes how to connect an IPC@CHIP to a database and exchange data between those. As there are no
Comparison table for an idea on features and differences between most famous statistics tools (AWStats, Analog, Webalizer,...).
What is AWStats AWStats is a free powerful and featureful tool that generates advanced web, streaming, ftp or mail server statistics, graphically. This log analyzer works as a CGI or from command line
Assignment 4 CPSC 217 L02 Purpose. Important Note. Data visualization
Assignment 4 CPSC 217 L02 Purpose You will be writing a Python program to read data from a file and visualize this data using an external drawing tool. You will structure your program using modules and
Resource Management Spreadsheet Capabilities. Stuart Dixon Resource Manager
Resource Management Spreadsheet Capabilities Stuart Dixon Resource Manager Purpose Single view of resource data Shows rolling demand vs supply for 14 months, 2 months back, current month, and 11 forward
RadBlue Load Tester Version 6. [Released: 09 DEC 2009]
Version 6 [Released: 09 DEC 2009] In this release, we modified the database setup screen of the RLT installer to default to SQL server information (the recommended database). The Transcript has been modified
SVN Authentication and Authorization
Admin Guide SVN Authentication and Authorization Authentication and Authorization of SVN Users via Active Directory and OpenLDAP Gérard Bieli, Christian Haller Windisch, 14th August 2009 Contents 1 Prerequisites
Consumer ID Theft Total Costs
Billions Consumer and Business Identity Theft Statistics Business identity (ID) theft is a growing crime and is a growing concern for state filing offices. Similar to consumer ID theft, after initially
W3Perl A free logfile analyzer
W3Perl A free logfile analyzer Features Works on Unix / Windows / Mac View last entries based on Perl scripts Web / FTP / Squid / Email servers Session tracking Others log format can be added easily Detailed
Computing & Telecommunications Services Monthly Report March 2015
March 215 Monthly Report Computing & Telecommunications Services Monthly Report March 215 CaTS Help Desk (937) 775-4827 1-888-775-4827 25 Library Annex [email protected] www.wright.edu/cats/ Last Modified
The SkySQL Administration Console
www.skysql.com The SkySQL Administration Console Version 1.1 Draft Documentation Overview The SkySQL Administration Console is a web based application for the administration and monitoring of MySQL 1 databases.
LICENSE4J FLOATING LICENSE SERVER USER GUIDE
LICENSE4J FLOATING LICENSE SERVER USER GUIDE VERSION 4.5.5 LICENSE4J www.license4j.com Table of Contents Getting Started... 2 Floating License Usage... 2 Installation... 4 Windows Installation... 4 Linux
dotdefender v5.12 for Apache Installation Guide Applicure Web Application Firewall Applicure Technologies Ltd. 1 of 11 support@applicure.
dotdefender v5.12 for Apache Installation Guide Applicure Web Application Firewall Applicure Technologies Ltd. 1 of 11 Installation Process The installation guide contains the following sections: System
Micros Troubleshooting & Error Message Guide.
Micros Troubleshooting & Error Message Guide. This document is a list of error message codes with descriptions and suggested solutions from Micros. If you're encountering errors with a system that was
The electronic Logbook @ the TTF VUV-FEL. Making the next step
The electronic Logbook @ the TTF VUV-FEL Making the next step R. Kammering -MVP- DESY in Hamburg Overview Introduction The TTF e-logbook The basic technology How does it look like? Changes since the first
opennms reporting generation tool
opennms reporting generation tool Juan Pedro Escalona DevOps Southampton, UK - 2014 Juan Pedro Escalona DevOps / Systems Administrator with over 6 years experience administering different OS, network systems
EventTracker: Configuring DLA Extension for AWStats Report AWStats Reports
EventTracker: Configuring DLA Extension for AWStats Report AWStats Reports Publication Date: Oct 18, 2011 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About This Guide Abstract
Managing Users and Identity Stores
CHAPTER 8 Overview ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through ACS requesting
Ashley Institute of Training Schedule of VET Tuition Fees 2015
Ashley Institute of Training Schedule of VET Fees Year of Study Group ID:DECE15G1 Total Course Fees $ 12,000 29-Aug- 17-Oct- 50 14-Sep- 0.167 blended various $2,000 CHC02 Best practice 24-Oct- 12-Dec-
Supervisor Instructions for Approving Web Time Entry
Supervisor Instructions for Approving Web Time Entry Time Approval Deadlines by Category Local 2110 Members members submit time by NOON on Monday of the pay week. Time should be approved no later than
Perl in a nutshell. First CGI Script and Perl. Creating a Link to a Script. print Function. Parsing Data 4/27/2009. First CGI Script and Perl
First CGI Script and Perl Perl in a nutshell Prof. Rasley shebang line tells the operating system where the Perl interpreter is located necessary on UNIX comment line ignored by the Perl interpreter End
Databases and SQL. Homework. Matthias Danner. June 11, 2013. Matthias Danner Databases and SQL June 11, 2013 1 / 16
Databases and SQL Homework Matthias Danner June 11, 2013 Matthias Danner Databases and SQL June 11, 2013 1 / 16 Install and configure a MySQL server Installation of the mysql-server package apt-get install
EMC Software Release and Service Dates for NetWorker and NetWorker Modules Last Updated on August 16, 2012
EMC Software Release and Service Dates for NetWorker and NetWorker Modules Last Updated on August 16, 2012 This report provides information about software releases, including release dates, any announced
So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we
Comparing share-price performance of a stock
Comparing share-price performance of a stock A How-to write-up by Pamela Peterson Drake Analysis of relative stock performance is challenging because stocks trade at different prices, indices are calculated
Log Analyzer Reference
IceWarp Unified Communications Log Analyzer Reference Version 10.4 Printed on 27 February, 2012 Contents Log Analyzer 1 Quick Start... 2 Required Steps... 2 Optional Steps... 3 Advanced Configuration...
CLC Server Command Line Tools USER MANUAL
CLC Server Command Line Tools USER MANUAL Manual for CLC Server Command Line Tools 2.5 Windows, Mac OS X and Linux September 4, 2015 This software is for research purposes only. QIAGEN Aarhus A/S Silkeborgvej
Analysing log files. Yue Mao ([email protected]) Supervisor: Dr Hussein Suleman, Kyle Williams, Gina Paihama. University of Cape Town
Analysing log files Yue Mao ([email protected]) Supervisor: Dr Hussein Suleman, Kyle Williams, Gina Paihama University of Cape Town ABSTRACT A digital repository stores a collection of digital objects
Domain Name. Domain Registrar. Web Site cpanel. www..com. www..net. www..biz URL: Username: Password: www.mydomain.com/cpanel. Username: Password:
314 Main Street Onalaska, WI 54650 608-787-8887 Why Use The Idea Center for Hosting Your Web Site? Yes, there are cheaper (even free) alternatives out there. What we will offer you is a reliable service,
When choosing where to install and run the log analyzer, be aware that it requires access to the following log files:
Insight Log Analyzer Tool: Introduction: The Insight log analyzer tool is intended to provide general statistics on use of the Luna Insight Software. It is a Perl script that parses logs generated by the
Hadoop and Map-Reduce. Swati Gore
Hadoop and Map-Reduce Swati Gore Contents Why Hadoop? Hadoop Overview Hadoop Architecture Working Description Fault Tolerance Limitations Why Map-Reduce not MPI Distributed sort Why Hadoop? Existing Data
CENTERPOINT ENERGY TEXARKANA SERVICE AREA GAS SUPPLY RATE (GSR) JULY 2015. Small Commercial Service (SCS-1) GSR
JULY 2015 Area (RS-1) GSR GSR (LCS-1) Texarkana Incorporated July-15 $0.50690/Ccf $0.45450/Ccf $0.00000/Ccf $2.85090/MMBtu $17.52070/MMBtu Texarkana Unincorporated July-15 $0.56370/Ccf $0.26110/Ccf $1.66900/Ccf
WHY USE ILLUMIN8 MARKETING FOR HOSTING YOUR WEB SITE?
QUESTIONS OR COMMENTS? email [email protected] or call 608-796-1990 WHY USE ILLUMIN8 MARKETING FOR HOSTING YOUR WEB SITE? Yes, there are cheaper (even free) alternatives out there. What we will
Perl In Secure Web Development
Perl In Secure Web Development Jonathan Worthington ([email protected]) August 31, 2005 Perl is used extensively today to build server side web applications. Using the vast array of modules on CPAN, one
HM2016 Detailed Chronological Schedule with Interwoven Production Deadlines
HM2016 Detailed Chronological Schedule with Interwoven Production Deadlines Date 2015 Aug. Sept. 8 Sept. 15 All Tech Sections meet at SOM meeting to review and discuss revisions to standards for the next
EMC Software Release and Service Dates for NetWorker and NetWorker Modules Last Updated on February 21, 2013
EMC Software Release and Service Dates for NetWorker and NetWorker Modules Last Updated on February 21, 2013 This report provides information about software releases, including release dates, any announced
Stanford Computer Security Lab. TrackBack Spam: Abuse and Prevention. Elie Bursztein, Peifung E. Lam, John C. Mitchell Stanford University
Abuse and Prevention Stanford University Stanford Computer Security Lab TrackBack Spam: Introduction Many users nowadays post information on cloud computing sites Sites sometimes need to link to each other
APACHE WEB SERVER. Andri Mirzal, PhD N28-439-03
APACHE WEB SERVER Andri Mirzal, PhD N28-439-03 Introduction The Apache is an open source web server software program notable for playing a key role in the initial growth of the World Wide Web Typically
Utilizing SFTP within SSIS
Utilizing SFTP within SSIS By Chris Ware, Principal Consultant, iolap, Inc. The Problem Within SSIS a FTP task exists which enables you to access a FTP server. However, it does not support Secure FTP (SFTP).
Based on Chapter 11, Excel 2007 Dashboards & Reports (Alexander) and Create Dynamic Charts in Microsoft Office Excel 2007 and Beyond (Scheck)
Reporting Results: Part 2 Based on Chapter 11, Excel 2007 Dashboards & Reports (Alexander) and Create Dynamic Charts in Microsoft Office Excel 2007 and Beyond (Scheck) Bullet Graph (pp. 200 205, Alexander,
SQL Server Instance-Level Benchmarks with DVDStore
SQL Server Instance-Level Benchmarks with DVDStore Dell developed a synthetic benchmark tool back that can run benchmark tests against SQL Server, Oracle, MySQL, and PostgreSQL installations. It is open-sourced
2013-2014. oct 03 / 2013 nov 12 / 2013. oct 05 / 2013. oct 07 / 2013. oct 21 / 2013. oct 24 / 2013. nov 07 / 2013 nov 14 / 2013.
2013- ACADEMIC CALENDARS SOUTH UNIVERSITY 2013- ACADEMIC CALENDAR Fall 2013 Winter Spring Summer New Student Orientation Session II (Mid ) oct 03 / 2013 nov 12 / 2013 jan 09 / feb 18 / apr 03 / may 13
Choosing a Cell Phone Plan-Verizon
Choosing a Cell Phone Plan-Verizon Investigating Linear Equations I n 2008, Verizon offered the following cell phone plans to consumers. (Source: www.verizon.com) Verizon: Nationwide Basic Monthly Anytime
UQC103S1 UFCE47-20-1. Systems Development. uqc103s/ufce47-20-1 PHP-mySQL 1
UQC103S1 UFCE47-20-1 Systems Development uqc103s/ufce47-20-1 PHP-mySQL 1 Who? Email: [email protected] Web Site www.cems.uwe.ac.uk/~jedawson www.cems.uwe.ac.uk/~jtwebb/uqc103s1/ uqc103s/ufce47-20-1 PHP-mySQL
Analysis of Web Archives. Vinay Goel Senior Data Engineer
Analysis of Web Archives Vinay Goel Senior Data Engineer Internet Archive Established in 1996 501(c)(3) non profit organization 20+ PB (compressed) of publicly accessible archival material Technology partner
Querying Databases Using the DB Query and JDBC Query Nodes
Querying Databases Using the DB Query and JDBC Query Nodes Lavastorm Desktop Professional supports acquiring data from a variety of databases including SQL Server, Oracle, Teradata, MS Access and MySQL.
Research Laboratory. Java Web Crawler & Hadoop MapReduce Anri Morchiladze && Bachana Dolidze Supervisor Nodar Momtselidze
Research Laboratory Java Web Crawler & Hadoop MapReduce Anri Morchiladze && Bachana Dolidze Supervisor Nodar Momtselidze 1. Java Web Crawler Description Java Code 2. MapReduce Overview Example of mapreduce
Cloud Services. Introduction...2 Overview...2. Security considerations... 2. Installation...3 Server Configuration...4
Contents Introduction...2 Overview...2 Security considerations... 2 Installation...3 Server Configuration...4 Management Client Connection...4 General Settings... 4 Enterprise Architect Client Connection
IceWarp Server. Log Analyzer. Version 10
IceWarp Server Log Analyzer Version 10 Printed on 23 June, 2009 i Contents Log Analyzer 1 Quick Start... 2 Required Steps... 2 Optional Steps... 2 Advanced Configuration... 5 Log Importer... 6 General...
HELP DESK MANUAL INSTALLATION GUIDE
Help Desk 6.5 Manual Installation Guide HELP DESK MANUAL INSTALLATION GUIDE Version 6.5 MS SQL (SQL Server), My SQL, and MS Access Help Desk 6.5 Page 1 Valid as of: 1/15/2008 Help Desk 6.5 Manual Installation
PROJECTS SCHEDULING AND COST CONTROLS
Professional Development Day September 27th, 2014 PROJECTS SCHEDULING AND COST CONTROLS Why do we need to Control Time and Cost? Plans are nothing; Planning is everything. Dwight D. Eisenhower Back to
Elgg 1.8 Social Networking
Elgg 1.8 Social Networking Create, customize, and deploy your very networking site with Elgg own social Cash Costello PACKT PUBLISHING open source* community experience distilled - BIRMINGHAM MUMBAI Preface
UCL Data Safe Haven (IDHS) User Group Town Hall Meeting
UCL Data Safe Haven (IDHS) UCL Data Safe Haven (IDHS) User Group Town Hall Meeting 16 th October 2014 Agenda Welcome Service Update Current software and services Usage statistics Project update Discussion:
A Tiny Queuing System for Blast Servers
A Tiny Queuing System for Blast Servers Colas Schretter and Laurent Gatto December 9, 2005 Introduction When multiple Blast [4] similarity searches are run simultaneously against large databases and no
10CS73:Web Programming
10CS73:Web Programming Question Bank Fundamentals of Web: 1.What is WWW? 2. What are domain names? Explain domain name conversion with diagram 3.What are the difference between web browser and web server
LogProcess v1.0 User Guide
LogProcess v1.0 Index Pages Subject Introduction 3 What is LogProcess? Installation & Configuration 4 System requirements 4-5 Installing the utility 6 Configuring LogProcess 7 Configuring IIS 8 Scheduling
ENERGY STAR for Data Centers
ENERGY STAR for Data Centers Alexandra Sullivan US EPA, ENERGY STAR February 4, 2010 Agenda ENERGY STAR Buildings Overview Energy Performance Ratings Portfolio Manager Data Center Initiative Objective
Lucid Key Server v2 Installation Documentation. www.lucidcentral.org
Lucid Key Server v2 Installation Documentation Contents System Requirements...2 Web Server...3 Database Server...3 Java...3 Tomcat...3 Installation files...3 Creating the Database...3 Step 1: Create the
Installing the ASP.NET VETtrak APIs onto IIS 5 or 6
Installing the ASP.NET VETtrak APIs onto IIS 5 or 6 2 Installing the ASP.NET VETtrak APIs onto IIS 5 or 6 3... 3 IIS 5 or 6 1 Step 1- Install/Check 6 Set Up and Configure VETtrak ASP.NET API 2 Step 2 -...
Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
Lesson 7 - Website Administration
Lesson 7 - Website Administration If you are hired as a web designer, your client will most likely expect you do more than just create their website. They will expect you to also know how to get their
TSM Studio Server User Guide 2.9.0.0
TSM Studio Server User Guide 2.9.0.0 1 Table of Contents Disclaimer... 4 What is TSM Studio Server?... 5 System Requirements... 6 Database Requirements... 6 Installing TSM Studio Server... 7 TSM Studio
Department of Public Welfare (DPW)
Department of Public Welfare (DPW) Office of Income Maintenance Electronic Benefits Transfer Card Risk Management Report Out-of-State Residency Review FISCAL YEAR 2012-2013 June 2013 (March, April and
Yandex: Webmaster Tools Overview and Guidelines
Yandex: Webmaster Tools Overview and Guidelines Agenda Introduction Register Features and Tools 2 Introduction What is Yandex Yandex is the leading search engine in Russia. It has nearly 60% market share
INT322. By the end of this week you will: (1)understand the interaction between a browser, web server, web script, interpreter, and database server.
Objective INT322 Monday, January 19, 2004 By the end of this week you will: (1)understand the interaction between a browser, web server, web script, interpreter, and database server. (2) know what Perl
www.apacheviewer.com Apache Logs Viewer Manual
Apache Logs Viewer Manual Table of Contents 1. Introduction... 3 2. Installation... 3 3. Using Apache Logs Viewer... 4 3.1 Log Files... 4 3.1.1 Open Access Log File... 5 3.1.2 Open Remote Access Log File
24x7 Help Desk Services Questions & Answers for RFP 40016_21030705
24x7 Help Desk Services Questions & Answers for RFP 40016_21030705 1. What % of the call volume that was listed in the RFP was related to LMS (BB and Moodle) support? See Table 5 2. What is the number
PHP on IBM i: What s New with Zend Server 5 for IBM i
PHP on IBM i: What s New with Zend Server 5 for IBM i Mike Pavlak Solutions Consultant [email protected] (815) 722 3454 Function Junction Audience Used PHP in Zend Core/Platform New to Zend PHP Looking to
CPanel User Guide DOCUMENTATION VERSION: 1.2
CPanel User Guide DOCUMENTATION VERSION: 1.2 Table of contents 1 What is CPanel? 8 2 How do I get help? 9 3 CPanel themes 10 4 How do I use CPanel? 11 4.1 Logging on..............................................
EventTracker: Configuring DLA Extension for AWStats report AWStats Reports
EventTracker: Configuring DLA Extension for AWStats report AWStats Reports Prism Microsystems Corporate Headquarter Date: October 18, 2011 8815 Centre Park Drive Columbia MD 21045 (+1) 410.953.6776 (+1)
CHOOSE MY BEST PLAN OPTION (PLAN FINDER) INSTRUCTIONS
CHOOSE MY BEST PLAN OPTION (PLAN FINDER) INSTRUCTIONS Anthem Medical Plan For Employees Working In the US February 10, 2012 Page 1 IMPORTANT NOTES YOU SHOULD CONSIDER BEFORE USING THE TOOL The Choose My
A Guide to the Insider Buying Investment Strategy
Mar-03 Aug-03 Jan-04 Jun-04 Nov-04 Apr-05 Sep-05 Feb-06 Jul-06 Dec-06 May-07 Oct-07 Mar-08 Aug-08 Jan-09 Jun-09 Nov-09 Apr-10 Sep-10 Mar-03 Jul-03 Nov-03 Mar-04 Jul-04 Nov-04 Mar-05 Jul-05 Nov-05 Mar-06
Intelligent chart recorder for compressed air and gases. Measurement - control - indication - alarm - recording - evaluation
DS 500 Intelligent chart recorder for compressed air and gases Measurement - control - indication - alarm - recording - evaluation new Advantages at a glance: Clear layout: 7" colour screen with touch
Portal Connector Fields and Widgets Technical Documentation
Portal Connector Fields and Widgets Technical Documentation 1 Form Fields 1.1 Content 1.1.1 CRM Form Configuration The CRM Form Configuration manages all the fields on the form and defines how the fields
ITRC announces latest updates of its Visitor Profile Study (VPS)
Thursday, 3 April 2014 ITRC announces latest updates of its Visitor Profile Study (VPS) IFT Tourism Research Centre (ITRC) is releasing today the most updated results of its Macao Visitor Profile Survey
2015-16 BCOE Payroll Calendar. Monday Tuesday Wednesday Thursday Friday Jun 29 30 Jul 1 2 3. Full Force Calc
July 2015 CM Period 1501075 July 2015 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 August 2015 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
CatDV Pro Workgroup Serve r
Architectural Overview CatDV Pro Workgroup Server Square Box Systems Ltd May 2003 The CatDV Pro client application is a standalone desktop application, providing video logging and media cataloging capability
IBM WebSphere Application Server V8.5 lab Basic Liberty profile administration using the job manager
IBM WebSphere Application Server V8.5 lab Basic Liberty profile administration using the job manager Scenario You are a system administrator responsible for managing web application server installations.
Glyma Deployment Instructions
Glyma Deployment Instructions Version 0.8 Copyright 2015 Christopher Tomich and Paul Culmsee and Peter Chow Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except
Sage Line 100 - Sage MMS - Sage 200 Version Features
Sage Line 100 - Sage MMS - Sage 200 Version Features Tel: 020 7831 3050 Email: [email protected] Line 100 v7.6 Last version of the character / DOS based Line 100 system See Module References
