Solved

Writing to Log file

Posted on 1998-09-15
6
118 Views
Last Modified: 2010-04-30
How can I  make my application to write each and every event to write into a log file. I am using win-nt and I would like to write all the events into my own log file instead of win-nt log file.
0
Comment
Question by:monalisa
  • 3
  • 3
6 Comments
 
LVL 14

Accepted Solution

by:
waty earned 10 total points
ID: 1435015
Go to my web site, you will find the logger OCX, wich does what you need : Logger.ocx

Web Site : http://www.geocities.com/ResearchTriangle/6311/
0
 

Author Comment

by:monalisa
ID: 1435016
First let me appreciate for the great work done by you.


I downloaded the logger.ocx and installed it on my system. I tried working with your test program, but unfortuantely it is not writing to the log file.

Here are the steps I followed

1) I unziped the files
2) Installed and registered the logger.ocx
3) Then I ran the test program
 i) First wrote some text with the option as error and repeated the same with other options.
 ii) Then selected the View option with all the options checked(error, infromation..). But I could see nothing in the log file.

Can you help me out in tracing the probelm.

Lot of thanks
0
 
LVL 14

Expert Comment

by:waty
ID: 1435017
Give me you e-mail, I will send you informations by mail.
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 

Author Comment

by:monalisa
ID: 1435018
my e-mail is koneruv@hotmail.com


0
 

Author Comment

by:monalisa
ID: 1435019
I didn't get the info
0
 
LVL 14

Expert Comment

by:waty
ID: 1435020
Oops, sorry for the delay, I probably lost the mail.

Did you tried to view the logfile directly under notepad?

I use this OCX every days in all my applications, and it works fine.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Enums (shorthand for ‘enumerations’) are not often used by programmers but they can be quite valuable when they are.  What are they? An Enum is just a type of variable like a string or an Integer, but in this case one that you create that contains…
You can of course define an array to hold data that is of a particular type like an array of Strings to hold customer names or an array of Doubles to hold customer sales, but what do you do if you want to coordinate that data? This article describes…
Get people started with the process of using Access VBA to control Outlook using automation, Microsoft Access can control other applications. An example is the ability to programmatically talk to Microsoft Outlook. Using automation, an Access applic…
This lesson covers basic error handling code in Microsoft Excel using VBA. This is the first lesson in a 3-part series that uses code to loop through an Excel spreadsheet in VBA and then fix errors, taking advantage of error handling code. This l…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now