|Log FIle Analysis
||...number of log files from an application that I run every day. This app creates a new log file every day...day. They are named like this: MesToJDE_2008_03_13.log, with a new date every day. What I want is to have...application of some sort that will go through each file in the directory and for each date give me a record
||PHP, Windows Desktop, Project Management, Engineering, Software Architecture, Software Testing, Microsoft, MySQL
||Mar 14, 2008
||Mar 14, 2008Ended
|RADIUS Log File Analysis
||...Dial Up Server information from a Windows Server Log File, at minimum the following 4 fields of information...hl=en&q=log+file+analysis>
This data must be able to be:
1. Extracted from source server log file(s)...to following formats for additional, external analysis:
b. Comma Delimited
||Oct 11, 2006
||Oct 11, 2006Ended
|Python Log Analysis Task
||The project consists of analyzing a large log file using Python. The main purpose of the program will...extract IP addresses from a large log file. The attached Project.zip file contains detailed project specifications...program properly functions using the wireshark CSV file.
||Oct 11, 2012
||Oct 11, 2012Ended
|Data Log Analysis
||I have a log file with 2 fields. I want to do analysis on it.
1. Search the frequency
2. Search...The log file is made up of combinations like this:
I want to go through this file and
||Data Processing, Excel, Business Analysis, Data Mining
||Jan 12, 2012
||Jan 12, 2012Ended
|Simple Access Log Analysis
||...account, I have logs for a number of subdomains. Each log is kept separately in the logs folder, for example:...output to screen, but directly to a downloadable file in this format: [subdomain.com,yahoo,google] For...in "yyyy-mm-dd" so that it can access the correct log. It will run and output the results as stated above
||PHP, Perl, Engineering, Software Architecture, Software Testing, MySQL
||May 24, 2005
||May 24, 2005Ended
|DDoS attack Tcpdump log file Analysis Program
DDoS attack Tcpdump log file Analysis Program.
I prefer PHP , MySQL , Scripting language.
Dev...Dev Server : CentOS 6.3
please read attack file : todo.txt
||PHP, Linux, MySQL, HTML
||Oct 5, 2012
||Oct 5, 2012Ended
|Internet Security - Forensic Work - log file analysis
||...freelancer to efficiently review log files for a forensic security analysis and backtrace suspected IP addresses
||Web Security, Network Administration, Internet Security
||May 12, 2015
||May 12, 2015Ended
|IIS Log File Analysis - Multiple Websites
||...for over 2 years. I need log file analysis provide. I'll provide you with the log files. You provide me... etc. The standard stuff.
I don't have a log file analyzer nor the time to do this.
||PHP, Windows Desktop, Engineering, Technical Writing, Software Architecture, Software Testing, Microsoft, MySQL
||Mar 29, 2004
||Mar 29, 2004Ended
|Apache log real time analysis
||...one or multiple apache log file and sending to the STDOUT some metrics on the file every x seconds. The...with cron.
The metrics to be extracted from the file are:
Number of 2xx code per x seconds
Number...code" file="name of the apache file tailed"
with one line per type of return code and per file.
||Python, Shell Script
||Apr 14, 2013
||Apr 14, 2013Ended
|Mobile Well Log Analysis App
||...developed for mobile devices. It needs to Import well log files in LAS 2.0 format to the application through...cloud. It should create plots from the imported log files and then annotate, adjust depth settings and...made, as a pdf file and then exported to the cloud or emailed to recipients.
||Mobile Phone, iPhone, Android, iPad
||Dec 8, 2014
||Dec 8, 2014Ended
|log analysis, need to fix bugs.
||I have web log analysis script which I have already written. Currently this script takes its variables...has names of all the servers. logfile.log server log file. myattempt.cgi my attempt to add functionality
||PHP, Perl, Internet Marketing, Engineering, Software Architecture, Software Testing, Website Testing, MySQL, Amazon Web Services, Website Management, Web Hosting
||Jun 20, 2004
||Jun 20, 2004Ended
||The main goal of this program is analysis of user activity(from log file) and creation of good and professionally
||PHP, Windows Desktop, Engineering, C# Programming, Software Architecture, Software Testing, Microsoft, MySQL
||Oct 12, 2004
||Oct 12, 2004Ended
|| Im developing RFID control system from a raspberry pi. I've solved most of the issues but have run into some things that are beyond my skillset with Linux.
I'm looking for someone to help trouble shoot issues with a good understanding of linux / embedded system. They aren't overly complicated but a challenge for me.
The role is ongoing.
||Python, Linux, Software Architecture, UNIX, , Video Production
||Dec 17, 2014
||Dec 17, 2014Ended
||...Perl (or any suitable programming language for analysis), and has knowledge of computer networks principals
||PHP, Perl, C Programming, Java, Python, Linux, Ruby on Rails, Matlab & Mathematica, Software Architecture, Software Testing, Anything Goes, UNIX
||Mar 1, 2009
||Mar 1, 2009Ended
||...hide and the next process is to call an another exe file from
another folder. up to this process this this...
opening the exe file, i want to pass these datas tothe login area of the exe file from my program. ...hide and the next process is to call an another exe file from
another folder. up to this process this this
||May 5, 2005
||May 5, 2005Ended
|Spyware / HijackThis Log File Application
||...download HijackThis and send me the log file. I then run the log file through an application that identifies...(no installing, it would have to be a self running file) a small application (the user would not really...be as simple as possible. Before they run the analysis, the application needs to ask them their name
||PHP, Translation, Windows Desktop, Engineering, Software Architecture, Software Testing, Website Testing, Microsoft, MySQL, Amazon Web Services, Website Management, Web Hosting
||Nov 2, 2004
||Nov 2, 2004Ended
|Simple log analysis script using apache Pig
||Analyze log files using pig script.
Some simple data to extract:
Users (ie unique session ids)
unique paths producing 404 errors
Access log should also exclude calls from pingdom / searchspiders...searchspiders etc (some at least)
Se sample file below
||Mar 16, 2013
||Mar 16, 2013Ended
||pleae find attached file for description. A simple log file needs to be created using C sharp that should...it should get data from XML and then store in a log file and then again send this data to XML format. Should
||PHP, Engineering, C# Programming, Software Architecture, Software Testing, MySQL
||Feb 3, 2006
||Feb 3, 2006Ended
|Web log Analyzer
||...whose input is a ISP log file the tool will analyze it and will display its analysis in form of graphs.
||Jun 5, 2009
||Jun 5, 2009Ended
|post log analysis - repost
||...review of post logs (log of broadcast airings for radio spots) and posing of the post log data to excel sheet
||Data Entry, Excel, Word
||Oct 29, 2013
||Oct 29, 2013Ended