Windows2000的日志文件通常有应用程序日志,安全日志、系统日志、DNS服务器日志、 FTP日志、WWW日志等等,可能会根据服务器所开启的服务不同。 一般步骤如下: 1.清除IIs的日志。 可不要小看IIS的日志功能,它可以详细的记录下你的入侵全过程,如 如你用unicod
Windows2000的日志文件通常有应用程序日志,安全日志、系统日志、DNS服务器日志、
FTP日志、WWW日志等等,可能会根据服务器所开启的服务不同。
一般步骤如下:
1.清除IIs的日志。
可不要小看IIS的日志功能,它可以详细的记录下你的入侵全过程,如
如你用unicode入侵时ie里打的命令,和对80端口扫描时留下的痕迹。你可能就因为对
其不注意,而被网管盯上,说不定还会.......呵呵
那我们就可手动清除吧
1.日志的默认位置:%systemroot%system32logfilesw3svc1,默认每天一个日志
那我们就切换到这个目录下吧
del *.*
你大概想是安全了吧,那就dir一下吧
咦,咦,今天的日志怎么还在,不要慌。因为w3svc服务还开着,那我们怎么清除这个日志文件呢?
方法一:如有3389可以登录,那就用notepad打开,把Ctrl+A 然后del吧。
方法二:net 命令
C:>net stop w3svc
World Wide Web Publishing Service 服务正在停止.(可能会等很长的时间,也可能不成功)
World Wide Web Publishing Service 服务已成功停止。
好了w3svc停止了,我们可以清空它的日志了,del *.*吧
还有不要忘了再打开w3svc服务呀
C:>net start w3svc
2.清除ftp日志。
FTP日志默认位置:%systemroot%sys tem32logfilesmsftpsvc1,默认每天一个日志
清除方法同上
3.清除Scheduler日志
Scheduler服务日志默认位置:%systemroot%schedlgu.txt
清除方法同上
4.应用程序日志、安全日志、系统日志、DNS日志默认位置:%systemroot%sys tem32config
清除方法同上
注意以上三个目录可能不在上面的位置,那是因为管理员做的修改
可以读取注册表值得到他们的位置
应用程序日志,安全日志,系统日志,DNS服务器日志,它们这些LOG文件在注册表中的:
HKEY_LOCAL_MACHINEsys temCurrentControlSetServicesEventlog
Schedluler服务日志在注册表中
HKEY_LOCAL_MACHINESOFTWAREMicrosoftSchedulingAgent
5.我是借鉴了别人文章(其实就是抄了)
OK!恭喜,现在简单的日志都已成功删除。下面就是很难的安全日志和系统日志了,守护这些日志的服务是Event Log,试着停掉它!
D:SERVERsys tem32LogFilesW3SVC1>net stop eventlog
这项服务无法接受请求的 "暂停" 或 "停止" 操作。
KAO,I 服了 U,没办法,它是关键服务。如果不用第三方工具,在命令行上根本没有删除安全日志和系统日志的可能!所以还是得用虽然简单但是速度慢得死机的办法:打开“控制面板”的“管理工具”中的“事件查看器”(98没有,知道用Win2k的好处了吧),在菜单的“操作”项有一个名为“连接到另一台计算机”的菜单,点击它如下图所示:
输入远程计算机的IP,然后点支烟,等上数十分钟,忍受象死机的折磨,然后打开下图:
选择远程计算机的安全性日志,右键选择它的属性:
点击属性里的“清除日志”按钮,OK!安全日志清除完毕!同样的忍受痛苦去清除系统日志!
6.上面大部分重要的日志你都已经清除了。然后要做的就是以防万一还有遗漏的了。
那就这样做吧 del以下的一些文件
winnt*.log
system32下
logfiles*.*
dtclog*.*
config*.evt
*.log
*.txt
到目前为止,我所知的大部分的日志我们已经教会了你清除的方法,那你就学以致用吧。
其实这篇文章的主要日的,不是教你怎么清除日志,而是教你写一个日志清除的工具。
就当我前面说的都是屁话吧。
现在转入正题:
前面你已经看到了要清除全部的日志的过程,是不是很繁呀,手动可是要花不少时间。有时
候还不一定可以清除干净。那就于编程的朋友来说,那就会想,可以我会编程,我怕什么。
那我们就动手吧。
你已经了解了,要清除一些日志,首先要关闭一些服务程序
那我就先教你怎么写一个可以看机器的服务程序的dos小工具吧,具体实现看我以前的文章
《如果做一个dos下的服务程序查看器》
工具名serName.exe
运行一下serName.exe吧
serName.exe -t 1 -t 1
呵呵,所有的机器正在运行的服务程序显示出来了吧。
记住你要关的服务程序名吧,,下面会有用的。
那编程的第二步就是实现关w3svc和shedule还有ftp等服务程序了。
我写的代码如下
对着msdn慢慢看吧。(不难的,有什么不懂不要来问我)
void StopServices(LPCTSTR lpServiceName)
{
SC_HANDLE scman = ::OpenSCManager(NULL,NULL,SC_MANAGER_ENUMERATE_SERVICE);
if(scman)
{
SC_HANDLE sh = ::OpenService(scman,lpServiceName,SERVICE_STOP);
if(sh)
{
BOOL bControl;
SERVICE_STATUS ServiceStatus;
bControl=ControlService(sh,SERVICE_CONTROL_STOP,&ServiceStatus);
DWORD dwControl;
if(bControl)
{
printf("success to stop the service "%s"n",lpServiceName);
}
else
{
dwControl=::GetLastError();
switch(dwControl){
case ERROR_ACCESS_DENIED :printf("The specified handle was not opened with the necessary access.n");break;
case ERROR_SERVICE_NOT_ACTIVE :printf("The service has not been started.n");break;
case ERROR_DEPENDENT_SERVICES_RUNNING :printf("The service cannot be stopped because other running services are dependent on it.n");break;
case ERROR_INVALID_SERVICE_CONTROL:printf("The requested control code is not valid, or it is unacceptable to the service.n");break;

MySQLhandlesconcurrencyusingamixofrow-levelandtable-levellocking,primarilythroughInnoDB'srow-levellocking.ComparedtootherRDBMS,MySQL'sapproachisefficientformanyusecasesbutmayfacechallengeswithdeadlocksandlacksadvancedfeatureslikePostgreSQL'sSerializa

MySQLhandlestransactionseffectivelyusingtheInnoDBengine,supportingACIDpropertiessimilartoPostgreSQLandOracle.1)MySQLusesREPEATABLEREADasthedefaultisolationlevel,whichcanbeadjustedtoREADCOMMITTEDforhigh-trafficscenarios.2)Itoptimizesperformancewithabu

MySQL data types are divided into numerical, date and time, string, binary and spatial types. Selecting the correct type can optimize database performance and data storage.

Best practices include: 1) Understanding the data structure and MySQL processing methods, 2) Appropriate indexing, 3) Avoid SELECT*, 4) Using appropriate JOIN types, 5) Use subqueries with caution, 6) Analyzing queries with EXPLAIN, 7) Consider the impact of queries on server resources, 8) Maintain the database regularly. These practices can make MySQL queries not only fast, but also maintainability, scalability and resource efficiency.

MySQLisbetterforspeedandsimplicity,suitableforwebapplications;PostgreSQLexcelsincomplexdatascenarioswithrobustfeatures.MySQLisidealforquickprojectsandread-heavytasks,whilePostgreSQLispreferredforapplicationsrequiringstrictdataintegrityandadvancedSQLf

MySQL processes data replication through three modes: asynchronous, semi-synchronous and group replication. 1) Asynchronous replication performance is high but data may be lost. 2) Semi-synchronous replication improves data security but increases latency. 3) Group replication supports multi-master replication and failover, suitable for high availability requirements.

The EXPLAIN statement can be used to analyze and improve SQL query performance. 1. Execute the EXPLAIN statement to view the query plan. 2. Analyze the output results, pay attention to access type, index usage and JOIN order. 3. Create or adjust indexes based on the analysis results, optimize JOIN operations, and avoid full table scanning to improve query efficiency.

Using mysqldump for logical backup and MySQLEnterpriseBackup for hot backup are effective ways to back up MySQL databases. 1. Use mysqldump to back up the database: mysqldump-uroot-pmydatabase>mydatabase_backup.sql. 2. Use MySQLEnterpriseBackup for hot backup: mysqlbackup--user=root-password=password--backup-dir=/path/to/backupbackup. When recovering, use the corresponding life


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Atom editor mac version download
The most popular open source editor

Notepad++7.3.1
Easy-to-use and free code editor

Dreamweaver Mac version
Visual web development tools

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.
