Question

Locate the log files on any device or application you have permissions to use. This could...

Locate the log files on any device or application you have permissions to use. This could be your personal computer, a lab VM, your home WiFi router, or an application running on your computer.

Go through the log files and find five different events that have been logged that you are unsure about what they mean. This could be a system event, an access request audit, or an error. Use a little GoogleFu and try and determine what caused the logged event. Post the information from each logged event with your explanation of event from what you found on the Internets.

Homework Answers

Answer #1

1. Event ID : 7001

This Event occurs if we change the version of the operationg system. for example if we upgrade windows 7 to windows 10, certain services may not work properly or certain adapters maynot work and this event occurs showing the error that "service cannot be started".

2. Event ID : 27

When the network link in our system is disconnected, this event occurs. When this event occurs, the network icon in taskbar will be shown with a cross mark , displaying a message "network cable is plugged out". if this occurs frequently try updating the network adapter.

3. Event ID : 32

When a network connection is established in our system, event with id 32 occurs. we often see this event after the event 27 has occured.When this event occurs, it shows a message "network link has been established".

4. Event ID : 137

The system goes to sleep mode even if choose it to "never sleep". This event can reduce the performance of the system. This may occur due to certain firmware.

5. Event ID : 10010

This is a system event saying that certain app is not registered with DCOM within the required time. in my system i tried opening PgAdmin buit it showed the error that "Server couldnot be connected". It is this Event which displays the before said message. sometimes we may need to remove the apploication which is causing this error. But ceratin apps works properly while reopening it.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Name two general subject directories or metasites you could use to locate audio and video files.
Name two general subject directories or metasites you could use to locate audio and video files.
Chapter 8: Searching, Extracting, and Archiving Data Exercise 8.a: Using grep, find, and regular expressions (Objective...
Chapter 8: Searching, Extracting, and Archiving Data Exercise 8.a: Using grep, find, and regular expressions (Objective 3.2) Linux Distribution: Fedora (non-root user & password needed) Desktop Environment: GNOME 3 1.   If you have not already done so, boot up your computer (or virtual machine) to start the Fedora Linux distribution. 2.   When the machine has booted up, access the tty2 virtual terminal by pressing Ctrl+Alt+F2. 3.   Log on to a regular user’s account by typing in the username at the...
(Use the case of “Global Treps”) You have been selected as the project manager for the...
(Use the case of “Global Treps”) You have been selected as the project manager for the Global Treps project. You helped to run a local shark tank like event at your college last year as part of a class project, so you have a general idea of what is involved. The schedule goal is six months, and the budget is $120,000. Your favorite professor, Dr. K., and a few of her associates have agreed to fund the project. Your strengths...
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems....
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems. The first thing they did was implement the best practice if separation of domains. As a result of this The bank had to get a new domain name. any change made in the records points to only one party who could have made that change. If you are a technical person, you must have office in a particular area of the building. accessing outside...
What role could the governance of ethics have played if it had been in existence in...
What role could the governance of ethics have played if it had been in existence in the organization? Assess the leadership of Enron from an ethical perspective. THE FALL OF ENRON: A STAKEHOLDER FAILURE Once upon a time, there was a gleaming headquarters office tower in Houston, with a giant tilted "£"' in front, slowly revolving in the Texas sun. The Enron Corporation, which once ranked among the top Fortune 500 companies, collapsed in 2001 under a mountain of debt...
Please read the article and answear about questions. Determining the Value of the Business After you...
Please read the article and answear about questions. Determining the Value of the Business After you have completed a thorough and exacting investigation, you need to analyze all the infor- mation you have gathered. This is the time to consult with your business, financial, and legal advis- ers to arrive at an estimate of the value of the business. Outside advisers are impartial and are more likely to see the bad things about the business than are you. You should...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT