HTTP Log

Table 275: HTTP Status Codes

Status Code

Reason Phrase

Description

100

Continue

Client should continue sending its request. This is a special status code; see below for details.

101

Switching Protocols

The client has used the Upgrade header to request the use of an alternative protocol and the server has agreed.

200

OK

Generic successful request message response. This is the code sent most often when a request is filled normally.

201

Created

The request was successful and resulted in a resource being created. This would be a typical response to a PUT method.

202

Accepted

The request was accepted by the server but has not yet been processed. This is an intentionally “non-commital” response that does not tell the client whether or not the request will be carried out; the client determines the eventual disposition of the request in some unspecified way. It is used only in special circumstances.

203

Non-Authoritative Information

The request was successful, but some of the information returned by the server came not from the original server associated with the resource but from a third party.

204

No Content

The request was successful, but the server has determined that it does not need to return to the client an entity body.

205

Reset Content

The request was successful; the server is telling the client that it should reset the document from which the request was generated so that a duplicate request is not sent. This code is intended for use with forms.

206

Partial Content

The server has successfully fulfilled a partial GET request. See the topic on methods for more details on this, as well as the description of the Range header.

300

Multiple Choices

The resource is represented in more than one way on the server. The server is returning information describing these representations, so the client can pick the most appropriate one, a process called agent-driven negotiation.

301

Moved Permanently

The resource requested has been moved to a new URL permanently. Any future requests for this resource should use the new URL.

This is the proper method of handling situations where a file on a server is renamed or moved to a new directory. Most people don’t bother setting this up, which is why URLs “break” so often, resulting in 404 errors as discussed below.

302

Found

The resource requested is temporarily using a different URL. The client should continue to use the original URL. See code 307.

303

See Other

The response for the request can be found at a different URL, which the server specifies. The client must do a fresh GET on that URL to see the results of the prior request.

304

Not Modified

The client sent a conditional GET request, but the resource has not been modified since the specified date/time, so the server has not sent it.

305

Use Proxy

To access the requested resource, the client must use a proxy, whose URL is given by the server in its response.

306

(unused)

Defined in an earlier (draft?) version of HTTP and no longer used.

307

Temporary Redirect

The resource is temporarily located at a different URL than the one the client specified.

Note that 302 and 307 are basically the same status code. 307 was created to clear up some confusion related to 302 that occurred in earlier versions of HTTP (which I’d rather not get into!)

400

Bad Request

Server says, “huh?” J Generic response when the request cannot be understood or carried out due to a problem on the client’s end.

401

Unauthorized

The client is not authorized to access the resource. Often returned if an attempt is made to access a resource protected by a password or some other means without the appropriate credentials.

402

Payment Required

This is reserved for future use. Its mere presence in the HTTP standard has caused a lot of people to scratch their chins and go “hmm…” J

403

Forbidden

The request has been disallowed by the server. This is a generic “no way” response that is not related to authorization. For example, if the maintainer of Web site blocks access to it from a particular client, any requests from that client will result in a 403 reply.

404

Not Found

The most common HTTP error message, returned when the server cannot locate the requested resource. Usually occurs due to either the server having moved/removed the resource, or the client giving an invalid URL (misspellings being the most common cause.)

405

Method Not Allowed

The requested method is not allowed for the specified resource. The response includes an Allow header that indicates what methods the server will permit.

406

Not Acceptable

The client sent a request that specifies limitations that the server cannot meet for the specified resource. This error may occur if an overly-restrictive list of conditions is placed into a request such that the server cannot return any part of the resource.

407

Proxy Authentication Required

Similar to 401, but the client must first authenticate itself with the proxy.

408

Request Timeout

The server was expecting the client to send a request within a particular time frame and the client didn’t send it.

409

Conflict

The request could not be filled because of a conflict of some sort related to the resource. This most often occurs in response to a PUT method, such as if one user tries to PUT a resource that another user has open for editing, for example.

410

Gone

The resource is no longer available at the server, which does not know its new URL. This is a more specific version of the 404 code that is used only if the server knows that the resource was intentionally removed. It is seen rarely (if ever) compared to 404.

411

Length Required

The request requires a Content-Length header field and one was not included.

412

Precondition Failed

Indicates that the client specified a precondition in its request, such as the use of an If-Match header, which evaluated to a false value. This indicates that the condition was not satisfied so the request is not being filled. This is used by clients in special cases to ensure that they do not accidentally receive the wrong resource.

413

Request Entity Too Large

The server has refused to fulfill the request because the entity that the client is requesting is too large.

414

Request-URI Too Long

The server has refused to fulfill the request because the URL specified is longer than the server can process. This rarely occurs with properly-formed URLs but may be seen if clients try to send gibberish to the server.

415

Unsupported Media Type

The request cannot be processed because it contains an entity using a media type the server does not support.

416

Requested Range Not Satisfiable

The client included a Range header specifying a range of values that is not valid for the resource. An example might be requesting bytes 3,000 through 4,000 of a 2,400-byte file.

417

Expectation Failed

The request included an Expect header that could not be satisfied by the server.

500

Internal Server Error

Generic error message indicating that the request could not be fulfilled due to a server problem.

501

Not Implemented

The server does not know how to carry out the request, so it cannot satisfy it.

502

Bad Gateway

The server, while acting as a gateway or proxy, received an invalid response from another server it tried to access on the client’s behalf.

503

Service Unavailable

The server is temporarily unable to fulfill the request for internal reasons. This is often returned when a server is overloaded or down for maintenance.

504

Gateway Timeout

The server, while acting as a gateway or proxy, timed out while waiting for a response from another server it tried to access on the client’s behalf.

505

HTTP Version Not Supported

The request used a version of HTTP that the server does not understand.

Advertisements

IIS Logs W3C

Table 10.1 W3C Extended Log File Fields
Field Appears As Description Default Y/N
Date date The date on which the activity occurred. Y
Time time The time, in coordinated universal time (UTC), at which the activity occurred. Y
Client IP Address c-ip The IP address of the client that made the request. Y
User Name cs-username The name of the authenticated user who accessed your server. Anonymous users are indicated by a hyphen. Y
Service Name and Instance Number s-sitename The Internet service name and instance number that was running on the client. N
Server Name s-computername The name of the server on which the log file entry was generated. N
Server IP Address s-ip The IP address of the server on which the log file entry was generated. Y
Server Port s-port The server port number that is configured for the service. Y
Method cs-method The requested action, for example, a GET method. Y
URI Stem cs-uri-stem The target of the action, for example, Default.htm. Y
URI Query cs-uri-query The query, if any, that the client was trying to perform. A Universal Resource Identifier (URI) query is necessary only for dynamic pages. Y
HTTP Status sc-status The HTTP status code. Y
Win32 Status sc-win32-status The Windows status code. N
Bytes Sent sc-bytes The number of bytes that the server sent. N
Bytes Received cs-bytes The number of bytes that the server received. N
Time Taken time-taken The length of time that the action took, in milliseconds. N
Protocol Version cs-version The protocol version —HTTP or FTP —that the client used. N
Host cs-host The host header name, if any. N
User Agent cs(User-Agent) The browser type that the client used. Y
Cookie cs(Cookie) The content of the cookie sent or received, if any. N
Referrer cs(Referrer) The site that the user last visited. This site provided a link to the current site. N
Protocol Substatus sc-substatus The substatus error code. Y

Ubuntu Xwindow Installation

Ubuntu Xwindow Installation

By | Published August 19, 2012

Which one would work for me?

 

This blog helped me. http://blog.naver.com/ssamba/163333072

 

==================

sudo apt-get install xinit
sudo apt-get update
sudo apt-get upgrade
sudo apt-get install ubuntu-desktop

 

======================

 

[soriel01@localhost] sudo su –   (관리자모드로 변환)
password :                               (root 권한 password 입력)
[root@localhost] apt-get update  (새로운 업데이트 확인)
[root@localhost] apt-get dist-upgrade     (업데이트)
[root@localhost] apt-get install xorg gdm (Graphic Mode 설치)
[root@localhost] apt-get install gnome-session gnome-menus gnome-panel metacity nautilus
(Gnome 설치)
[root@localhost] apt-get install [다음 Package 설치]
gnome-applets
gnome-control-center
gnome-volume-manager
libsmbclient
gnome-screensaver
menu
network-manager-gnome
gnome-utils
gnome-system-tools
gnome-netstatus-applet
gnome-nettool
libgnomevfs2-extra
——-<다음은 유용한 Package>
gnome-terminal
gedit
firefox
——-<다음은 데스크탑 테마 Package>
ubuntu-artwork
ubuntu-sounds
human-theme
usplash-theme-ubuntu

[root@localhost] apt-get install gnome-app-install update-manager restricted-manager
(패키지 관리자 설치)

[root@localhost] /etc/init.d/gdm start   (그래픽 모드로 고고씽)

KasperskKaspersky is asking for help?

The Mystery of Gauss : Kaspersky needs help Decrypting Gauss Malware

Posted by EHN Reporter on Wednesday, August 15, 2012 | 0 comments 

       

Researchers at Kaspersky Lab are asking the public for help in cracking encryption of the recently discovered malware Gauss.

“Perhaps the most interesting mystery is Gauss’ encrypted warhead. Gauss contains a module named ‘Godel’ that features an encrypted payload. The malware tries to decrypt this payload using several strings from the system and, upon success, executes it. Despite our best efforts, we were unable to break the encryption. ” Securelist blog post reads.

“So today we are presenting all the available information about the payload in the hope that someone can find a solution and unlock its secrets. We are asking anyone interested in cryptology and mathematics to join us in solving the mystery and extracting the hidden payload.”

The payload is delivered to machines via an infected USB stick that uses the .lnk exploit to execute the malicious activity. In addition to the encrypted payload, infected USB sticks deliver two other files that also contain encrypted sections that Kaspersky has been unable to crack.

 
“The code that decrypts the sections is very complex compared to any regular routine we usually find in malware,” Kaspersky writes. Kaspersky believes one of these sections may contain data that helps crack the payload.If you are a world class cryptographer or if you can help kaspersky with decrypting them, you can contact Kaspersky by e-mail: theflame@kaspersky.com.