System - Logging
Live Instructor Led Online Training Logging courses is delivered using an interactive remote desktop! .
During the course each participant will be able to perform Logging exercises on their remote desktop provided by Qwikcourse.
Select among the courses listed in the category that really interests you.
If you are interested in learning the course under this category, click the "Book" button and purchase the course. Select your preferred schedule at least 5 days ahead. You will receive an email confirmation and we will communicate with trainer of your selected course.
Adminlog provides the command line tool "i" which permits administrators to read, write, and share first person notes about their administrative actions on a server.
Autocheck is a distributed, extensively configurable, systems monitoring tool for unix'es written in Perl. It includes SMS and email notification and a lot of checks.
BSDSAR is a System Activity Reporter for FreeBSD. It is very useful if you have a server that is used for NFS, web, ftp, samba, etc, serving and you need to know how heavily loaded the box is.
BackupRotator is a small Java utility to rotate files of any kind (including backup files, log files, etc.) and to be able to keep the newest *n* files.
Battery Life Tool Kit is a set of scripts and programs to monitor and log power consumption of Linux laptops/notebooks under different workloads. Set of reference workloads is included in the Tool Kit
A file integrity checker. Similar to hashdeep but in a GUI.
DeepDigest is a file integrity checker. It calculates hash values for selected files and allows the files to be verified against those values. Its GUI interface provides several features not found in similar programs. Roughly speaking, DeepDigest is a GUI version of md5deep/sha1deep/sha256deep. To use DeepDigest, a user first creates a "job". This specifies the directory to be hashed and the hash algorithm to be used (MD5, SHA-1 or SHA-256). The results of a job run are saved to an archive file. Subsequent runs of the job are compared to this archive to determine which files have changed. New, deleted, renamed or moved files are also reported. The results view may be sorted, filtered and searched. Results may be exported in csv format or to another installation of DeepDigest. DeepDigest may be run from the command line and from scripts. The name of the job to be run is passed as a command line argument. DeepDigest is written in C++ and uses the Qt libraries.
EventCentral collects each night in a central repository Microsoft Windows' event logs from the network neighbourhood. They can be checked the next morning via a web page.
Fail2SQL is an addon to Fail2Ban which logs information to a MySQL database. This information can then be used in reports, graphs or by third party programs to take further action such as permanent blocking, reporting to ISP etc.
User Computer and IP Address Tracking
FWNUA (Free Windows Network User Accounting) runs silently in a Windows login script or GPO and collects data about user logins. FWNUA keeps track of the workstations logins so you don't have to! FWNUA now supports syslog and Splunk! Look for the fwnua - syslog version in the files list. Use Splunk or your own syslog server with data mining tools to create a robust user tracking system. Find our Spunk app on Splukbase
Frontier Data System is a collection programs for data acquisition and data mining. It uses MySQL and PHP to monitor process variables and performance of shop floor equipment. Produces information on issues such as cycle time, downtime and SPC.
We are looking for a general solution that monitors execution of any program, regardless of the programing language it has been written in, or the accessibility to source code.
This product sniffs web traffic on a Linux/Unix machine and creates log files for each website in CLF, Accrue, or a Verbose format. It can be configured with any IP address/Port Number combination, or it can be configured with domain names or virtual h
GamutLogViewer© is log file, logfile, viewer that works with Log4J, Log4Net, NLog, and user defined formats including ColdFusion. It supports filtering, searching, highlighting and many other useful features. This is a Windows application.
Recursive computing and matching of Context Triggered Piecewise Hashing (aka Fuzzy Hashing). Supports Windows, *nix, BSD, OS X, etc.
Logwatch is a customizable log analysis system. Logwatch parses through your system's logs and creates a report analyzing areas that you specify. Logwatch is easy to use and will work right out of the package on most systems.
Graphical viewer for GNU ddrescue mapfiles
This small tool allows the user to graphically examine ddrescue's mapfiles in a user friendly GUI application. The Main window displays a block grid with each block's color representing the block types it contains. Many people know this type of view from defragmentation programs. The program is written in Object Pascal using the Lazarus IDE. It can be compiled to run on Windows, GNU/Linux and probably OS X, too. The downloads include binaries for the respective target platform and the project files (source code). Update 2020/09/01: ddrescueview version 0.4 alpha 4 has been released. Please consider testing this version.
Windows visual tail for log and text files
WinTail is a freeware Tail for Windows tool, capable of simulating the LINUX / UNIX tail command, including extra features offered by the Windows GUI concept. Includes features such as SMTP and sound notifications of specific keywords found within the files being monitored by a sort of grep functionalty. This tool is compatible with all 32bit/64bit Windows platforms both client and server.
Cyberoam iView; the Intelligent Logging & Reporting solution provides organizations network visibility across multiple devices to achieve higher levels of security, data confidentiality while meeting the requirements of regulatory compliance. To know more about Cyberoam and it’s security solutions.
Wipe erase data from hdds on the network, unlimited hard disks
Automated network based hard disk drives / storage devices erasure is server based software which installs on a central server. Server is connected to network switches and several PXE boot enabled workstations are attached to the network. As soon as the workstation is powered on, it boots off the network via the server and begins wiping all the attached hard disk drives. Once all the hard drives are wiped, data related to each hard disk is stored in the central server’s database. Read WIKI Automated unattended network based data erasure wiping Comprehensive Reporting Web GUI reporting Generates certificate of data erasure Barcodes Labels Graphs Pie / Bar / Line Charts Hard Disks bad sectors & health reporting Hard Disk SMART Data collection Database Driven Distributed System Hard Disk Drives health reports Part Open Source * Friendly GUI Graphical User Interface Mass Hard Disk Drive Destruction Data Wiping HDD Data Eraser Storage Array Data Wipe
Immune Security Architecture For your Enterprise -- Host-Based Intrusion detection for UNIX based systems, at the process level. Detect changes in the normal behavior of processes, advanced features to detect Buffer Overflows.
JENNOM - Java Enterprise Network Nodes Monitor
JENNOM - Java Enterprise Network Nodes Monitor, project free, portable, cross-platform and 100%-pure java. ICMP and DNS used to check the nodes. In addition, Jennom calculate loss packets and all sending packets - see 'Loss/All' column. Support filtering by different fields and export data to PDF/XLS/XML/CSV files. Use standart OS ICMP packet-size - Linux=64 bytes, Windows=32 bytes. When any node change state, Jennom write message to DB, send message to remote syslog-server and can send email for you. Only state changes will be fixed ! Support both IPv4 and IPv6.Support monitoring by IP-address and DNS-name.For DNS-name also checked DNS-service. Successfully tested in Windows and Linux for more 200 nodes. There are 2 application versions identical on a functionality - developed by JavaEE stack technologies and developed by Spring stack technologies + JSF/PrimeFaces + Apache Shiro security framework. Need JRE 1.8.
James Bond Log is a daemon log watcher similar to swatch or logcheck , it's completly written in C using PCRE Library and it provides the ability to be chrooted. It's actually at developing stage.
Usefull keylogger to keep track of your kids ect.
This keylogger will provide you with access to keystokes, as well as screenshots of your user. This product emails the keystrokes in a readable format with logging data.
A detailed user action logging engine
The Logging of User Actions in Relational Mode (LUARM) is a logging/audit engine designed to record in detail user actions in a Relational Database Management System (RDBMS). You can then have an organized 'who is doing what' view in your system, being able to easily correlate program execution, file access and network endpoint activity to user entities.
The program I create here is a purely console based program in the language C. The program makes it easier to searching after periodic events to a log file.
Log4Cocoa is an Objective-C based port of the popular Java based logging package Log4J. Additionally, Log4Cocoa plans to provide pure C based bindings as well. Log4Cocoa is not affiliated with the Apache Jakarta project in any way.
LogView4J is a Java Swing Log4J socket listener GUI that makes application debugging simple. It has an intuitive user interface and is designed from the ground up for use of use, speed and stability, with features specifically tailored for Java developer
Command-Line search tool for syslog files
Lograptor is a search tool for system logs written in legacy BSD syslog format RFC 3164 and for IETF syslog protocol RFC 5424. The program can perform searches in syslog files like as the UNIX command "grep", but with the addition of some filters and parameters, useful to restrict the search field and retrieve the relevant informations from log files. You could specify parameters like hostname, application, date, time range, plus a set of filters on message data.
LumberJack4Logs is a viewer for log and trace files with the ability to extend the recognized data formats by adding text parser plugins.
MRTG Front End. An individually configurable dynamix indexmaker for mrtg that can also calculate total incoming/outgoing data for a specified time period, view target configurations and more.
log4j support for native nagios (nsca) integration
This project encompasses a custom appender for log4j, intended for system administrators and/or developers interested in using the log4j architecture to push messages to Nagios, via the Nagios nsca server. Release 2.0.0 supports asynchronous message delivery, tunable timeouts, and a buffer for redelivery support.
A simple keylogger written in python. It is primarily designed for backup purposes, but can be used as a stealth keylogger, too. It does not raise any trust issues, since it is a set of [relatively] short python scripts that you can easily examine.
Logsurfer is a program for monitoring system logs in real-time, and reporting on the occurrence of events. It is capable of grouping information together to enhance loganalysis and create automatic reports.
Fail2Ban monitors log files like /var/log/pwdfail or /var/log/apache/error_log and bans failure-prone addresses. It updates firewall rules to reject the IP address or executes user defined commands. Please see code and download from . SF Fail2ban portal might not be up-to-date
LKL is a userspace keylogger that runs under Linux on the x86 arch. LKL logs everything that passes through the hardware keyboard port (0x60). It translates keycodes to ASCII with a keymap file.
Lilith is a logging and access event viewer for Logback, log4j & java.util.logging. It has features comparable to Chainsaw for log4j. This means that it can receive logging events from remote applications using Logback as their logging backend
A C++ diagnostic logging API that is simple to use, 100% type-safe, generic, infinitely-extensible, atomic, platform-independent, and extremely efficient. And, best of all, it upholds the spirit of C: you only pay for what you use.
360-FAAR Analyze FW1 Cisco Netscreen Policy Offline Using Config/Logs
360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, firewall policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in Checkpoint dbedit, Cisco ASA or ScreenOS commands, and its one file! Read Policy and Logs for: Checkpoint FW1 (in odumper.csv / logexport format), Netscreen ScreenOS (in get config / syslog format), Cisco ASA (show run / syslog format), 360-FAAR compares firewall policies and uses CIDR and text filters to split rulebases / policies into target sections and identify connectivity for further analysis. 360-FAAR supports, policy to log association, object translation, rulebase reordering and simplification, rule moves and duplicate matching automatically. Allowing you to move rules to where you need them. Build new rulebases from scratch with a single 'any' rule and log files, with the 'res' and 'name' options. Switch into DROPS mode to analyse drop log entries.
Rootsh is a wrapper for shells which logs all echoed keystrokes and terminal output to a file and/or to syslog. It's main purpose is the auditing of users who need a shell with root privileges. They start rootsh through the sudo mechanism.
This project is to develop an installer package for a python key logger I modified for stealth use It will be packaged with NSIS for distribution on portableapps.com and elsewhere. it will fit on a usb key and provide quick and easy key logging on the go
Firewall log analyzer
Flexible web-based firewall log analyzer, supporting netfilter and ipfilter, ipfw, ipchains, cisco routers and Windows XP system logs, and mysql or postgresql database logs using the iptables ULOG or NFLOG target of netfilter others mapped to the ulogd format with a view. Fully supports IPv6 for database logs, and netfilter and ipfilter system file logs. Also supports Maxmind's GeoIP version 2 location databases. For Linux, FreeBSD, OpenBSD, Solaris, OSX,etc.
Partylog2 is a Graylog2 appliance based in Turnkey Linux 12
Partylog2 is a Graylog2 appliance ready to install or boot in LiveCD mode. Its based in TurnKey Linux (TurnKey Core 12) which is based in Debian 6.
Internet line monitor for mobile internet/wireless users.
Internet line monitor for mobile internet/wireless users. This application provides a traybar Icon which instantly gives you an indication of the speed/quality of your current internet connection.
Project Lasso is Windows-based open source software designed to collect Windows event logs, including custom application logs, and provide central collection and transport of Windows log data via UDP/TCP syslog.
This is my collection of Java classes. Major chunks include: robust logging system, JDBC connection pools, lightweight application server, general utility classes.... enjoy.
This is a port to Qt/C++ of the Jakarta project's excellent log4j package. Qt users can now benefit from a logging package that can be configured at run-time, thus minimizing (and ideally, eliminating) recompilation.
Quick, simple, terminal inspired keylog tool for beginners
Very basic, easy to read, easy to use keylogger tool. Developed for education purposes, and runs on the terminal. Includes option to run in stealth mode
Simple Log File Monitor is a set of scripts to help monitor logs
Simple Log File Monitor is a bash script that can be used to monitor log files or other text files and execute commands on the output of the logfile. The motivation for this script originally was to be able to get a subset of a log file emailed to an email address easily while still being portable. Built to use as little as possible, a system with bash, wc, grep, tail, and date should be able to use this script, though a command-line email client would be required to send emails out.
SysLog2ODBC for Windows is a SysLog server with ODBC logging facility that can be run as a Win32 service. It starts listening on a configurable UDP port and, for each syslog message it receives, it executes a customizable SQL statement.
Syslog Collector listen for syslog messages and parse them following some regular expressions. It then increment some counters which are exposed through SNMP Agent-X interface
Multiplatform: Easy setup Syslog Server tool for recording network messages. It opens the UDP port 514 on your computer to act as Syslog Server and displays the messages immediately in your screen.
Hyperic is application monitoring and performance management for virtual, physical, and cloud infrastructures. Auto-discover resources of 75+ technologies, including vSphere, and collect availability, performance, utilization, and throughput metrics.
MSLB is a crossplatform Simple Logbook program / application to write work logs or even a diary. MSLB can also use a bunch of presets that you can add with a simple doubleclick :) Logs get saved in a simple folder system. And its all portable.
A complete OpenSource Network Management System Is SNMP-Standard Oriented (tested on Cisco and Linux). It Integrates Syslog, Tacacs, RRDtool (Performance Graphs), Maps, Traps, TFTP, Autodiscovery, Sound Alerts, AAA, Modular and Extensible.
THIS PROJECT HAS BEEN ABANDONED SINCE 2007, NO SUPPORT WILL BE PROVIDED. Winpooch is a watchdog for Windows (2000, XP, 2003, but only 32-bits). It detects modifications in your system, so as to detect a trojan or a spyware installation. It also includes a real-time anti-virus. Set your own security level for anti-spyware, ant
Output spool reader for Snort! This program decouples output overhead from the Snort network intrusion detection system and allows Snort to run at full speed. It takes input and output plugins and can therefore be used to convert almost any spooled fil
sudosh is a sudo shell, filter and can be used as a login shell. Sudosh records all keystrokes and output and can play back the session as just like a VCR.
xrootconsole tails a file in a window on your X11 root window. It aims to be as simple and resource-light as possible, within reason: it should run smootlhy on a P133 laptop. The program is non-interactive; all configuration is done on the command line.
TCP/UDP endpoint analysis and mapping utility.
Providing users the ability to with accuracy map all inbound and outbound TCP/UDP connections to a Process ID and process owner. The application will also map a port to various performance metrics like processor and memory utilization.
Windows Moble 6.0/6.5 and Windows XP/Vista/7 Application for worktimeloggingand -analysing. Easily captures worktimes and breaktimes each day. Outputs a .csv file (Microsoft Excel conform) result file monthly. Fingerfriendly User-Interface on Mobile
Windows Tail is a C# program which functions as the UNIX tail command. It allows you to open a file after which it will display all new content written to that file. Output can also be filtered using regular expressions.
A better way to rotate apache logs. It can rotate multiple times a day and it compresses logs AFTER httpd stops writing to them. Deletes old logs based on partition fullness.
augrok is a Linux audit log analysis tool written in Perl that provides searches based on real and effective user/group ids along with login id, executable name, terminal, within a time range, regular expression matching, and so much more.
logs file, ctime, atime, mtime, size, type (file or dir may be include link in the future), md5sum and date. After easy to query (sqlite3) and find duplicate arqs and generate a set of commands to remove|move the dups files.
Search words in text files, display matching lines in tabs. Options to save results, exclude words, display the line numbers. Tiny file for searching big text files. Please leave feedback to help improve the application. Documentation coming soon.
Looking for a simple way to use FB login method without FB sdk?
Looking for a simple way to use FB login method without FB sdk? Then you are in luck, because this is the most simplest login method for Facebook that could be made. Requirements - Timer - Textbox 1 "Username" - TextBox 2 "Password" - Button1 "Login" It's simple as that, no need for any other addons!
HFE is open source project for editing huge text files on Windows platforms. No installation required, can be used as portable app.
Weblooker monitors serveral services on multiple systems for their sta
Weblooker monitors serveral services on multiple systems for their status, up- and downtimes. A webgui and Android client to view the current status and logged downtimes is available as separately package.
Log common Windows trojan attempts (and optionally emulate the trojan). *This project is not actively maintained, and the software is of little use today.*
Logcheck is software package that is designed to automatically run and check system log files for security violations and unusual activity. Logcheck utilizes a program called logtail that remembers the last position it read from in a log file.
Extension of phpLicenseWatcher
This tool is an extension of the phpLicenseWatcher tool which allows you to analyse your license usage in more detail. The tools manages user in custom groups (departments) at a given date range. Additionally you can see your actual license usage and the usage of defined workstations.
phpWatch is a flexible service monitoring system. Features include multiple contact methods for when services malfunction, multiple query methods, statistics gathering, and a fully extendable architecture for developers.
English: Pyrotate is Python program for log files rotation. It uses any external archiver such as Winrar, 7-zip or gzip for compress and may rotate files in GNU/Linux logrotate's style. Program works in any OS such as Windows, Linux, Unix, Mac OS, etc, where Python may work. Dependencies: - Python v2.6 or better v2.7 (v2.5 for pyrotate v0.8 or earlier) - an external archiver Russian: Программа для ротации и/или архивации логов (и любых других) файлов, которая использует любой внешний архиватор и может ротировать файлы в стиле Линуксовой программы logrotate в любой ОС, где работает интерпретатор языка Python. Требования: - Python не ниже v2.6, а лучше v2.7 (или v2.5 для pyrotate v0.8 или ранее) - любой внешний архиватор
Querylog is a console tool for performing SQL queries on a (log) files. Lines from one or more text files or stdin are matched, using regular expressions to an in memory database on which SQL queries can be performed.
yalimon (Yet another linux monitoring tool) is a python script that runs as a cron job, gathers data from several commands, stores it in a database and then creates graphs out of it. A web interface is used to view the images and to manage the module
A replacement to traditional syslog daemons. Including cryptographic log protection, mysql, postgresql. Supported on Linux, BSD, Irix, Solaris and AIX.
netleak is a collection of small perlscripts that detects connectivity between network segments. It is mostly useful to detect "leaks" in large organizations that have private network segments physically separated from the Internet.
A syslog server written in C# .NET 4.0 that is modular, which allows a developer to easily add parsers and storage modules. A GUI console is included to view messages in real-time being captured by the server. Two functional modules are included.
ANSI sequence filter
Ansifilter handles text files containing ANSI terminal escape codes. The command sequences may be stripped or be interpreted to generate formatted output (HTML, RTF, TeX, LaTeX, BBCode and Pango Markup).
Mysql Monitor Tool is a useful application to monitor multiple Mysql server instances. Its simple and effective user interface allows you to track the health of your servers, check parameters and visualize trends via real time charts.
IT Admin tool used for remote computer and network information
NetComp Scan comes with 7 tools to make life easier ComputerInfo - Allows you to get basic information from remote computer including last logged on user, storage device info, time since last restart, and installed programs. IP info - Ping allows you to get your computer IP information including public IP and also allows you to ping like cmd. MAC Changer - Changes MAC with option to revert to default. Ping Sweep - Sweeps a specified network range and returns online devices. Port Scanner - Scans a specified port range on a networked device and returns open/ closed ports. Uptime Monitor - Add multiple hosts and monitor real time "online" status with easy to see color scheme. Wifi Scan - Scan for wifi AP's and list all devices found. AP's are discovered by BSSID so you can see every AP around you. This tool also allows you to create log files for multiple AP's to help monitor your networks. A complete description of what each tool does can be found in the help menu
Visual components ready for ASCII rendering
Instantly create ASCII reports, multi-column tables, graphs, ... These can be rendered on screen, files and most importantly log streams.
The High Interaction Honeypot Analysis Toolkit (HIHAT) allows to transform arbitrary PHP applications into a web-based Honeypot. A semi-automatic user interface supports the analysis process, scans for attacks etc.
Metalog is a modern replacement for syslogd and klogd. The logged messages can be dispatched according to their facility, urgency, program name and/or Perl-compatible regular expressions. Log files can be automatically and safely rotated.
Php-Loging-System is a front-end for viewing syslog-ng messages and snort alerts logged to MySQL in real-time, with Apache, Bash, and Squid detailed searching and analysis.
SB EventLog Monitor is monitoring and consolidating Windows EventLogs. Events are collected from server using VBS and WMI or by Windows agent. Events are parsed using PHP and YOUR rules and are stored in MySQL database. Email alerts are supported.
In the field of Logging learning from a live instructor-led and hand-on training courses would make a big difference as compared with watching a video learning materials. Participants must maintain focus and interact with the trainer for questions and concerns. In Qwikcourse, trainers and participants uses DaDesktop , a cloud desktop environment designed for instructors and students who wish to carry out interactive, hands-on training from distant physical locations.
For now, there are tremendous work opportunities for various IT fields. Most of the courses in Logging is a great source of IT learning with hands-on training and experience which could be a great contribution to your portfolio.
Logging Online Courses, Logging Training, Logging Instructor-led, Logging Live Trainer, Logging Trainer, Logging Online Lesson, Logging Education