Jack, look here: http://www.rtek200.com/Tech/InternetSecureLinks.html in the
Tools section for usage reporting tools.
=========================================================
Best,
Roman M. Zeltser
RS Information Systems, Inc.
410-966-6192
NCC, DNE
*** Securing your retirement money from hackers.***
-----Original Message-----
From: Robert MacDonald [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, August 23, 2000 10:52 AM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: [FW1] Parsing Log Files
Jack,
www.webtrends.com
Robert
- -
Robert P. MacDonald, Network Engineer
e-Business Infrastructure
G o r d o n F o o d S e r v i c e
Voice: +1.616.261.7987 email: [EMAIL PROTECTED]
>>> "Mogren, Jack L." <[EMAIL PROTECTED]> 8/23/00 9:52:58 AM >>>
>
>Folks,
> From time to time I am required to monitor a particular device's activity
>via the firewall logs. In the past, I have done so by logging the device's
>activity, performing a logexport of the log file, then reading the file
into
>an Excel spreadsheet or MS Access database. Problems with this crude
>process pop up when the logexport file is very large. Is there a better
way
>to do this? Is there a way to parse the raw log files without (or before)
>resorting to logexport? Is there some nifty software out there that will
do
>this for me?
>
>Jack Mogren
>Mayo Clinic
>Information Security
============================================================================
====
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
============================================================================
====
================================================================================
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
================================================================================