GoGreen PC Tune-Up™
Learn More

this is how ssl encrypt our websites
MTNCOMP | List View | Table View | myBlog (1751 Entries)
myBlog Home


Filling in the gaps in your logs and adding an obfuscated signature

by Mountain Computers Inc., Publication Date: Saturday, September 19, 2020

View Count: 746, Keywords: Log Files, Fill in gaps, adding obfuscation signatures, Hashtags: #LogFiles #Fillingaps #addingobfuscationsignatures

If your organization has log tracking for your work orders, be sure to add your simple unique signature phrase to your log notes such that you know it was your log entry.
 Mine was, "another happy customer" or just "ahc" somewhere in the entry. I have found that log entries can be compromised and limited reporting and restricted reporting from your end point. So the best thing to do if reporting is restrictive is to add your signature within something that you can search for.
For example, when your reporting tools do not allow you to search for your log entries by name, creation, modification, or completion and assignment, just add within the log entry your special phrase and you can search that and it will pull through in your reporting. It's a bypass workaround method that works even if administration overrides try to prevent you from searching for your own work orders.
more to come...

if you found this article helpful, consider contributing $10, 20 an Andrew Jackson or so..to the author. more authors coming soon
FYI we use paypal or patreon, patreon has 3x the transaction fees, so we don't, not yet.

© 2024 myBlog™ v1.1 All rights reserved. We count views as reads, so let's not over think it.