search
HomeDatabaseMysql Tutorialwindows2000的日志清除器怎么练成

Windows2000的日志文件通常有应用程序日志,安全日志、系统日志、DNS服务器日志、 FTP日志、WWW日志等等,可能会根据服务器所开启的服务不同。 一般步骤如下: 1.清除IIs的日志。 可不要小看IIS的日志功能,它可以详细的记录下你的入侵全过程,如 如你用unicod

   Windows2000的日志文件通常有应用程序日志,安全日志、系统日志、DNS服务器日志、

  FTP日志、WWW日志等等,可能会根据服务器所开启的服务不同。

  一般步骤如下:

  1.清除IIs的日志。

  可不要小看IIS的日志功能,它可以详细的记录下你的入侵全过程,如

  如你用unicode入侵时ie里打的命令,和对80端口扫描时留下的痕迹。你可能就因为对

  其不注意,而被网管盯上,说不定还会.......呵呵

  那我们就可手动清除吧

  1.日志的默认位置:%systemroot%system32logfilesw3svc1,默认每天一个日志

  那我们就切换到这个目录下吧

  del *.*

  你大概想是安全了吧,那就dir一下吧

  咦,咦,今天的日志怎么还在,不要慌。因为w3svc服务还开着,那我们怎么清除这个日志文件呢?

  方法一:如有3389可以登录,那就用notepad打开,把Ctrl+A 然后del吧。

  方法二:net 命令

  C:>net stop w3svc

  World Wide Web Publishing Service 服务正在停止.(可能会等很长的时间,也可能不成功)

  World Wide Web Publishing Service 服务已成功停止。

  好了w3svc停止了,我们可以清空它的日志了,del *.*吧

  还有不要忘了再打开w3svc服务呀

  C:>net start w3svc

  2.清除ftp日志。

  FTP日志默认位置:%systemroot%sys tem32logfilesmsftpsvc1,默认每天一个日志

  清除方法同上

  3.清除Scheduler日志

  Scheduler服务日志默认位置:%systemroot%schedlgu.txt

  清除方法同上

  4.应用程序日志、安全日志、系统日志、DNS日志默认位置:%systemroot%sys tem32config

  清除方法同上

  注意以上三个目录可能不在上面的位置,那是因为管理员做的修改

  可以读取注册表值得到他们的位置

  应用程序日志,安全日志,系统日志,DNS服务器日志,它们这些LOG文件在注册表中的:

  HKEY_LOCAL_MACHINEsys temCurrentControlSetServicesEventlog

  Schedluler服务日志在注册表中

  HKEY_LOCAL_MACHINESOFTWAREMicrosoftSchedulingAgent

  5.我是借鉴了别人文章(其实就是抄了)

  OK!恭喜,现在简单的日志都已成功删除。下面就是很难的安全日志和系统日志了,守护这些日志的服务是Event Log,试着停掉它!

  D:SERVERsys tem32LogFilesW3SVC1>net stop eventlog

  这项服务无法接受请求的 "暂停" 或 "停止" 操作。

  KAO,I 服了 U,没办法,它是关键服务。如果不用第三方工具,在命令行上根本没有删除安全日志和系统日志的可能!所以还是得用虽然简单但是速度慢得死机的办法:打开“控制面板”的“管理工具”中的“事件查看器”(98没有,知道用Win2k的好处了吧),在菜单的“操作”项有一个名为“连接到另一台计算机”的菜单,点击它如下图所示:

  输入远程计算机的IP,然后点支烟,等上数十分钟,忍受象死机的折磨,然后打开下图:

  选择远程计算机的安全性日志,右键选择它的属性:

  点击属性里的“清除日志”按钮,OK!安全日志清除完毕!同样的忍受痛苦去清除系统日志!

  6.上面大部分重要的日志你都已经清除了。然后要做的就是以防万一还有遗漏的了。

  那就这样做吧 del以下的一些文件

  winnt*.log

  system32下

  logfiles*.*

  dtclog*.*

  config*.evt

  *.log

  *.txt

  到目前为止,我所知的大部分的日志我们已经教会了你清除的方法,那你就学以致用吧。

  其实这篇文章的主要日的,不是教你怎么清除日志,而是教你写一个日志清除的工具。

  就当我前面说的都是屁话吧。

  现在转入正题:

  前面你已经看到了要清除全部的日志的过程,是不是很繁呀,手动可是要花不少时间。有时

  候还不一定可以清除干净。那就于编程的朋友来说,那就会想,可以我会编程,我怕什么。

  那我们就动手吧。

  你已经了解了,要清除一些日志,首先要关闭一些服务程序

  那我就先教你怎么写一个可以看机器的服务程序的dos小工具吧,具体实现看我以前的文章

  《如果做一个dos下的服务程序查看器》

  工具名serName.exe

  运行一下serName.exe吧

  serName.exe -t 1 -t 1

  呵呵,所有的机器正在运行的服务程序显示出来了吧。

  记住你要关的服务程序名吧,,下面会有用的。

  那编程的第二步就是实现关w3svc和shedule还有ftp等服务程序了。

  我写的代码如下

  对着msdn慢慢看吧。(不难的,有什么不懂不要来问我)

  void StopServices(LPCTSTR lpServiceName)

  {

  SC_HANDLE scman = ::OpenSCManager(NULL,NULL,SC_MANAGER_ENUMERATE_SERVICE);

  if(scman)

  {

  SC_HANDLE sh = ::OpenService(scman,lpServiceName,SERVICE_STOP);

  if(sh)

  {

  BOOL bControl;

  SERVICE_STATUS ServiceStatus;

  bControl=ControlService(sh,SERVICE_CONTROL_STOP,&ServiceStatus);

  DWORD dwControl;

  if(bControl)

  {

  printf("success to stop the service "%s"n",lpServiceName);

  }

  else

  {

  dwControl=::GetLastError();

  switch(dwControl){

  case ERROR_ACCESS_DENIED :printf("The specified handle was not opened with the necessary access.n");break;

  case ERROR_SERVICE_NOT_ACTIVE :printf("The service has not been started.n");break;

  case ERROR_DEPENDENT_SERVICES_RUNNING :printf("The service cannot be stopped because other running services are dependent on it.n");break;

  case ERROR_INVALID_SERVICE_CONTROL:printf("The requested control code is not valid, or it is unacceptable to the service.n");break;

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
How does MySQL handle concurrency compared to other RDBMS?How does MySQL handle concurrency compared to other RDBMS?Apr 29, 2025 am 12:44 AM

MySQLhandlesconcurrencyusingamixofrow-levelandtable-levellocking,primarilythroughInnoDB'srow-levellocking.ComparedtootherRDBMS,MySQL'sapproachisefficientformanyusecasesbutmayfacechallengeswithdeadlocksandlacksadvancedfeatureslikePostgreSQL'sSerializa

How does MySQL handle transactions compared to other relational databases?How does MySQL handle transactions compared to other relational databases?Apr 29, 2025 am 12:37 AM

MySQLhandlestransactionseffectivelyusingtheInnoDBengine,supportingACIDpropertiessimilartoPostgreSQLandOracle.1)MySQLusesREPEATABLEREADasthedefaultisolationlevel,whichcanbeadjustedtoREADCOMMITTEDforhigh-trafficscenarios.2)Itoptimizesperformancewithabu

What are the data types available in MySQL?What are the data types available in MySQL?Apr 29, 2025 am 12:28 AM

MySQL data types are divided into numerical, date and time, string, binary and spatial types. Selecting the correct type can optimize database performance and data storage.

What are some best practices for writing efficient SQL queries in MySQL?What are some best practices for writing efficient SQL queries in MySQL?Apr 29, 2025 am 12:24 AM

Best practices include: 1) Understanding the data structure and MySQL processing methods, 2) Appropriate indexing, 3) Avoid SELECT*, 4) Using appropriate JOIN types, 5) Use subqueries with caution, 6) Analyzing queries with EXPLAIN, 7) Consider the impact of queries on server resources, 8) Maintain the database regularly. These practices can make MySQL queries not only fast, but also maintainability, scalability and resource efficiency.

How does MySQL differ from PostgreSQL?How does MySQL differ from PostgreSQL?Apr 29, 2025 am 12:23 AM

MySQLisbetterforspeedandsimplicity,suitableforwebapplications;PostgreSQLexcelsincomplexdatascenarioswithrobustfeatures.MySQLisidealforquickprojectsandread-heavytasks,whilePostgreSQLispreferredforapplicationsrequiringstrictdataintegrityandadvancedSQLf

How does MySQL handle data replication?How does MySQL handle data replication?Apr 28, 2025 am 12:25 AM

MySQL processes data replication through three modes: asynchronous, semi-synchronous and group replication. 1) Asynchronous replication performance is high but data may be lost. 2) Semi-synchronous replication improves data security but increases latency. 3) Group replication supports multi-master replication and failover, suitable for high availability requirements.

How can you use the EXPLAIN statement to analyze query performance?How can you use the EXPLAIN statement to analyze query performance?Apr 28, 2025 am 12:24 AM

The EXPLAIN statement can be used to analyze and improve SQL query performance. 1. Execute the EXPLAIN statement to view the query plan. 2. Analyze the output results, pay attention to access type, index usage and JOIN order. 3. Create or adjust indexes based on the analysis results, optimize JOIN operations, and avoid full table scanning to improve query efficiency.

How do you back up and restore a MySQL database?How do you back up and restore a MySQL database?Apr 28, 2025 am 12:23 AM

Using mysqldump for logical backup and MySQLEnterpriseBackup for hot backup are effective ways to back up MySQL databases. 1. Use mysqldump to back up the database: mysqldump-uroot-pmydatabase>mydatabase_backup.sql. 2. Use MySQLEnterpriseBackup for hot backup: mysqlbackup--user=root-password=password--backup-dir=/path/to/backupbackup. When recovering, use the corresponding life

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Atom editor mac version download

Atom editor mac version download

The most popular open source editor

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

Dreamweaver Mac version

Dreamweaver Mac version

Visual web development tools

Safe Exam Browser

Safe Exam Browser

Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.