Skip to main content

Another Hidden Windows XP Application : Windows Event Viewer

Another Hidden Windows XP Application : Windows Event Viewer

Windows Event Viewer is a little-known tool that can help you
troubleshoot PC problems. It keeps a log of things that happen on your
system. But you will have to do some work to find it.

Now, if you want to know if little Billy has been playing computer
games, you'll have to look elsewhere. Event Viewer just tracks system
events. For example, you'll see entries for when the computer is booted
or shut down.

To locate the Event Viewer, click Start>>Control Panel. Double-click
Administrative Tools and double-click Event Viewer.

In the left side of the window, you'll see three entries: Application,
Security and System. You'll probably be most interested in System
events, or maybe Application events.

To view the events for a specific category, click its name in the left
pane. The events for that category will be listed in the right pane.
The events listed probably won't mean much to you. For example, it will
list names like Information, Error and Warning. It will also list a
source and an event number.

If you double-click an entry in the list, it will give you a little
more information. (You will be most interested in Errors and maybe
Warnings). The Event Properties dialog box will open, providing a
description of the event.

The description may be cryptic. In that case, click the link at the
bottom of the Description section. You will be prompted to send the
information over the Internet. Click Yes. Another window will open,
giving you more information.

Sometimes information can be sparse. In that case, visit the following
site:

Code:

Code:
http://www.eventid.net/search.asp
You'll need to enter the event ID and the event source. It will provide
more information on the problem.

By default, event logs aren't saved for long. You can extend that.

Right-click one of the category names in the left pane. Select
Properties and open the General tab. You can change the size and
specify that events are kept in the log longer than the default seven
days. When you're done, click OK. Do this for each category

Comments

Popular posts from this blog

Duplicate IP Address has been Detected Rule

A duplicate IP address has been detected on the network Rule Knowledgebase Summary This rule generates an alert when Windows® detects that he local machine’s IP address is in conflict with one or more identical IP addresses on the network. Until the IP address conflict is resolved, remote clients and applications may have difficulty accessing resources on any of the effected computers. Additionally, the local computer may not be able to access network resources. Related Events This rule generates an alert whenever the following events occur and are recorded in the System Event Log: The system detected an address conflict for IP address %2 with the system having network hardware address %3. The local interface has been disabled. Source: TCPIP; Event ID: 4198; The system detected an address conflict for IP address %2 with the system having network hardware address %3. The local interface has been disabled. Source: TCP...

Schedule Automatic backup config in Cisco Nexus

Schedule Automatic backup config in Cisco Nexus Nexus-Sw1(config)#feature scheduler   //Enable scheduler service in Nexus Nexus-Sw1(config)#scheduler job name backup-daily      // Job Name Nexus-Sw1(config)#scheduler aaa-authentication username abcd password abcd@123     // AAA - Authentication for Job created above (If AAA configured) Nexus-Sw1(config)#scheduler job name backup-daily copy running-config tftp://192.168.1.23/$(SWITCHNAME)-cfg.$(TIMESTAMP)         //IP of TFTP SERVER , file will saved with switch name and timestamp exit Nexus-Sw1(config)#scheduler schedule name backup-daily   // Setup Schedule to run for the JOB Nexus-Sw1(config-schedule)# time ?   daily    Specify a daily schedule   monthly  Specify a monthly schedule   start    Specify a future time schedule   weekly   Specify a weekly schedule...

How to enable SSH login access to a Cisco router

This guide walks you through how to setup SSH on a Cisco Router. SSH is by far more secure then telnet. Telnet allows your passwords to be sent in plain text that anyone can see and gain access to your network. SSH is all encrypted traffic. NOTE: This should work with any Cisco router provided the Cisco IOS on the router supports ssh. Firstly is ssh enabled? router#sh ip ssh SSH Disabled - version 2.0 %Please create RSA keys to enable SSH. Authentication timeout: 60 secs; Authentication retries: 5 In this case its not, if you got a error saying that sh ip ssh is not recognized then you would know that ssh is not supported or possibly that the command is different for your platform. How to enable SSH on a Cisco 800 series router# config term router(config)#crypto key generate rsa usage-keys label router-key The name for the keys will be: router-key Choose the size of the key modulus in the range of 360 to 2048 for your ...