desktop security software  
security desktop order software software library technical support

security desktop


Desktop Security

Internet Security

PC Time Limit

Protect Files

Security FAQ

Windows Tips

Internet FAQ


limit, kids, pc, time, security, desktop, child, online, limits, password, control, user, restrict, access, protect, privacy, internet, children




The Usage Log

All HTTP services provide a log. The IIS is no exception. The log provides many different functions. Among them is the ability to track the usage of your pages for marketing purposes. This enables you to know whether you are providing the kinds of information and services that your market wants. There are several formats for HTTP logs, and they all are similar in structure. Figure 6.8 shows an example of the IIS log. The file is basically a comma-separated text file of 15 columns. The differences come from what is in each column. If you put in the results of other HTTP server log files, they would be practically indistinguishable from one another.

Internet FAQ top

l Security Officer l Internet Explorer Security l Protect Files l User Time Control l Security Desktop l Site Map

Copyrights 2006 Eugene Mihailov. All rights reserved