desktop security software  
security desktop order software software library technical support

security desktop

Home

Desktop Security

Internet Security

PC Time Limit

Protect Files

Security FAQ

Windows Tips

Internet FAQ

 

limit, kids, pc, time, security, desktop, child, online, limits, password, control, user, restrict, access, protect, privacy, internet, children

 

 

 

The Usage Log

All HTTP services provide a log. The IIS is no exception. The log provides many different functions. Among them is the ability to track the usage of your pages for marketing purposes. This enables you to know whether you are providing the kinds of information and services that your market wants. There are several formats for HTTP logs, and they all are similar in structure. Figure 6.8 shows an example of the IIS log. The file is basically a comma-separated text file of 15 columns. The differences come from what is in each column. If you put in the results of other HTTP server log files, they would be practically indistinguishable from one another.

Internet FAQ top
 

l Security Officer l Internet Explorer Security l Protect Files l User Time Control l Security Desktop l Site Map

Copyrights 2006 Eugene Mihailov. All rights reserved