Name: Yosefe DestaSemester: SummerYear: 2022Section Number: 9041Lab 3 Worksheet Digital ForensicsTechnology and PracticesTable of ContentsIntroduction...............................................................................................................................................................2Screenshot 1 – Yourname Displayed in the Server Manager Dashboard...................................................................3Screenshot 2 – Yourname Displayed in the IIS Server Installation..............................................................................4Screenshot 3 –YOURNAME FTP Site in Internet Information Services.......................................................................5Screenshot 4 – YOURNAME echoed into the iisstart.htm file....................................................................................6Screenshot 5 – Yourname Windows Website.............................................................................................................7Screenshot 6 – FTP File within the C:\Inetpub\ftproot Directory...............................................................................8Screenshot 7– Yourname FTPsite...............................................................................................................................9Screenshot 8– Yourname Linux Website..................................................................................................................10Screenshot 9 – Yourname Windows Website using 10.X.X.X IP...............................................................................11Screenshot 10 –Use grep to find Yourname in the auth.log file...............................................................................12Conclusion...............................................................................................................................................................13APA References........................................................................................................................................................141
IntroductionStudents:In the box below, please explain the purpose of using the Logs and Web Logs andexplain how they are relevant to Digital Forensics Technology and Practices.IntroductionInformation gathered via logging has the potential to be very useful for software engineers, IT specialists, and businessanalysts if it is put to good use. Enterprises may use log data to detect application issues as soon as they occur. Inaddition, it may give essential information into how users are using apps and help developers and incident respondersfix problems in a timelier method. Most compromised websites do not keep records that would reveal how they werebreached. Technical difficulties may be quickly resolved and responsibility for actions can be enforced with the use oflogs. DevOps teams may benefit greatly from the use of log data in helping them to detect issues within their appsmore quickly. Log management solutions with real-time log analysis and alarm features are often used to do this. Whenissues arise inside an application, it may be possible to determine their origin by analyzing log data. When an issueoccurs in the system, the application's error log normally records relevant information such as the entire stack trace.With this information, developers may follow the chain of events back to the method call that caused the exception,which simplifies the investigation of the problem and the reproduction of its occurrence. As a result, responders have abetter grasp of the issue at hand and can implement a more long-lasting fix. Finally, although log data is invaluable forfixing application errors, it also has additional uses. To fully comprehend how consumers interact with an application,developers may utilize log data.
Upload your study docs or become a
Course Hero member to access this document
Upload your study docs or become a
Course Hero member to access this document
End of preview. Want to read all 16 pages?
Upload your study docs or become a
Course Hero member to access this document
Term
Fall
Professor
professor_unknown
Tags