Home
 > search for

Featured Documents related to »  logs viewer


InsideOut Makes Firewall Reporting Useful
Firewall logs can be cryptic and very difficult to analyze. There are a number of firewall reporting products on the market that attempt to address this problem

logs viewer  to review your firewall's logs on a daily basis. Unfortunately, firewall logs can be cryptic and very difficult to analyze. There are a number of firewall reporting products on the market that attempt to address this problem, however one particular product recently caught our attention. Unlike many of the other firewall reporting products on the market, Stonylake Solutions ' InsideOut Firewall Reporter is truly useful. InsideOut reports the same basic type of information as most other firewall reporting Read More...
Business Intelligence (BI)
Business intelligence (BI) and performance management applications enable real-time, interactive access, analysis, and manipulation of mission-critical corporate information. These applications pro...
Start evaluating software now
Country:

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » logs viewer


PeopleSoft on Client/Server and Database Issues
To address questions for a TEC customer, we interviewed PeopleSoft's Michael Daniels. The conversation covered issues in the areas of client/server architecture

logs viewer  and password and automatically logs on to all appropriate servers. It is an important feature that the client should investigate with any ERP vendor being considered. The exact method of making the call to the SSO product should be discussed in depth. Question: What is the maximum number of concurrent production users that has been recorded by PeopleSoft? TEC Analysis: Mr. Daniels was unable to answer this question immediately, but according to benchmarks recorded on their web site, PeopleSoft has been Read More...
Segregation of Duties and Its Role in Sarbanes-Oxley Compliance Issues
The Sarbanes-Oxley Act (SOX) requires publicly traded firms to demonstrate that their accounting and reporting practices are in compliance with regulatory

logs viewer  workflow processes. No audit logs are used to document unusual system or application occurrences. No root cause analysis is performed to determine what caused an unusual event. Twin Pillars of Protection In any organization, IT serves as both the gatekeeper and the distribution point for information. Financial-reporting serves as the means to support an IT infrastructure. Insofar as systems infrastructure and financial reporting are linked, the requirement to ensure the integrity of the system and the Read More...
Vendor Analysis: Kaspersky Anti-Virus Products Examined
Kaspersky Labs is no newcomer to anti-virus products. Headquartered in Moscow, Russia, with offices in Pleasanton, California and Cambridge, England, Kaspersky

logs viewer  a day. Anti-virus scan logs should be reviewed on a regular schedule. Reports generated by anti-virus products offer valuable information for understanding which viruses are invading your network. Messaging servers are particularly vulnerable to viruses (sent in via email) and installing anti-virus products directly on messaging servers is a very effective way of combating viruses. Many viruses sent via Zip files can get past anti-virus software on messaging servers which is why it is important to have Read More...
Release of SP7 Continues SAP HANA’s Fast Rise in the Enterprise Software World
After SAP HANA’s announcement during the 2013 TechEd conference in Las Vegas, it looks like the SAP HANA Service Pack 7 has finally arrived. SAP HANA’s new

logs viewer  measures via snapshots and logs for replay, cascading replication features and stretch cluster configurations. SAP’s approach with the release of SP7 certainly serves the purpose of reinforcing HANA to take a deeper position within mission critical deployments and as part of wider corporate solutions and IT infrastructures. It also makes the case for evolving all SAP HANA data management tools and applications.   Fast growth and openness, a factor for success Based on the development path since the Read More...
FRx Poised to Permeate Many More General Ledgers Part Two: Market Impact
Since FRx already has integrations built to over forty leading general ledgers (and now a scalable tool kit available to accommodate virtually all others), the

logs viewer  Poised to Permeate Many More General Ledgers Part Two: Market Impact Event Summary FRx Software ( www.frxsoftware.com ) is a prominent provider of financial analytic applications to mid-market and corporate businesses. FRx has largely remained on its established track after being acquired first by one of its erstwhile greatest partners (former Great Plains Software ) in 2000, and particularly after its new owner subsequently ended up under Microsoft 's roof in 2001 (see Microsoft And Great Plains - A Read More...
Business Intelligence Portal (BI Portal)
The Silverlight BI Portal is a centralized repository for data analyzing and reporting tools. AD Integrated Authentication and tight integration with the MS

logs viewer  Intelligence Portal (BI Portal) The Silverlight BI Portal is a centralized repository for data analyzing and reporting tools. AD Integrated Authentication and tight integration with the MS Report Server make it ideal for intranet deployments. Forms Based Authentication and SQL Server based storage engine, are also supported to allow SSAS Cubes to be securely exposed to Internet users. The portal utilizes direct calls to the back-end servers, thus eliminating the middle tier - no impersonation and Read More...
Engage AudienceNet Brings Users the Ads They Want To See
Engage has introduced a new product that delivers ads to users who are most likely to be receptive to them. AudienceNet relies on data collecting, proprietary

logs viewer  are mined from web logs of the participating websites, although sharing of logs with Engage is not a requirement of belonging to the network. While the total package of categories and other information allows sites a great deal of discrimination in serving ads, Engage expects that many will rely on predefined clusters of characteristics; these are general demographic groupings like Active and Athletic Adults, Affluent Individuals, Business Professionals, College Students, and Heads of Households. Engage Read More...
Fighting Cybercrime on the Internet
Excerpts from a presentation on cybercrime by Laura Taylor, TEC Director of Security Research for the E-Gov 2000 Conference sponsored by SAIC on July 10, 2000

logs viewer  Cybercrime on the Internet Fighting Cybercrime on the Internet L. Taylor - July 18, 2000 Introduction This note is based on a presentation on cybercrime by Laura Taylor, TEC Director of Security Research for the E-Gov 2000 Conference sponsored by SAIC on July 10, 2000 at the Washington Convention Center. Note : Portions of this note are excerpted from the presentation, other parts are explanatory text to relate this information to the Technology community serviced by the TEC web site. Information Read More...
How to Defend Against New Botnet Attacks
In 2008, botnets were responsible for 90 percent of spam. The ever-changing nature of botnets makes them hard to detect and even harder to defend against@and

logs viewer  of checking your server logs in the morning. If you see web browsing activity when no one was there to do the browsing, that’s your cue to investigate. Administrators using WatchGuard Firebox® models will be pleased to know that the Firebox’s proxies stop non-standard traffic attempting to run on standard ports. For example, the spamming botnet Mega-D runs non-standard, homebrew traffic over HTTP port 80. The Firebox’s HTTP Proxy would spot and block such traffic instantly, by default. Block Read More...
The AS/400 Takes You Securely Where You Want to Go
This article on the built-in security features of the AS/400 system originally appeared in the Midrange Computing’s Showcase Magazine, June 2000.

logs viewer  using restricted instructions. These logs should be reviewed on a regular schedule by a security engineer. QMAXSIGN The QMAXSIGN parameter is for specifying the number of sign-on attempts allowable for a particular user from a particular device. If the number of unsuccessful attempts to sign-on to the AS/400 exceeds this number, the device from which the user attempted access is disconnected. QRETSVRSEC The QRETSVRSEC parameter determines whether or not security authentication data needed by the AS/400 Read More...
InsideOut Firewall Reporter Unravels the Mysteries of Your Firewall Logs
The most important piece of hardware that protects your network from intruders, hackers, and outside traffic is your firewall. Firewalls process an enormous

logs viewer  Mysteries of Your Firewall Logs Executive Summary The most important piece of hardware that protects your network from intruders, hackers, and outside traffic is your firewall. Firewalls process an enormous amount of data, that when converted to useful information, can tell you many things about the packets traveling in and out of your network. Recently we took a look at InsideOut Firewall Reporter (IFR), created by Stonylake Solutions to find out how it interprets data and information produced by a Read More...
SAS Puts the “E” in “Data”
SAS Institute has applied its data mining technology to the Internet. The company released products that will help companies analyze and predict the behavior of

logs viewer  parse and analyze web logs has been added. The core of the company's strategy to offer what they call a closed-loop E-infrastructure is E-Discovery that has the data mining capabilities of existing SAS products such as Entreprise Miner. E-Discovery can be used withWebHound or other log analysis programs to find patterns in the data that are not identifiable from logs alone. Such patterns might be that users who visit pages A and B also tend to visit pages C and D, or that users who purchase baby oil Read More...
FRx Poised to Permeate Many More General Ledgers Part Four: Competitors and User Recommendations
With Integration Designer and Forecaster, FRx has taken critical steps forward in creating value for its customers and resellers. FRx should expend the

logs viewer  Poised to Permeate Many More General Ledgers Part Four: Competitors and User Recommendations Event Summary FRx Software ( www.frxsoftware.com ) is a prominent provider of financial analytic applications to mid-market and corporate businesses. FRx has largely remained on its established track after being acquired first by one of its erstwhile greatest partners (former Great Plains Software ) in 2000, and particularly after its new owner subsequently ended up under Microsoft 's roof in 2001 (see Read More...
Finding Your Way Around E-commerce
Breaking into E-commerce can have you going in circles. This document provides an E-Commerce Roadmap to both prepare you for your trip and keep you from bumping

logs viewer  from the web server logs by an intern, but you'll find that many different departments want different kinds of packaging and details. Traffic reports are their clue to what works and what doesn't, and the faster they can find out about a page that's too boring for people to read, or one that's a grabber, the faster one can make changes that have a direct or indirect effect on revenues. This may be the one piece of web technology that everyone on the business side will use - and scream about when the Read More...

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others