Solved

How to open/read a file of larges size = 120 GB

Posted on 2011-09-13
6
293 Views
Last Modified: 2012-06-21
I have an error log file, which has size of 120 GB. I am unable to open in Notepad or notepad++.
Or is there any editor to do this.
Or is there any wayout to solve this problem.
0
Comment
Question by:searchsanjaysharma
6 Comments
 
LVL 17

Expert Comment

by:Shanmuga Sundaram
ID: 36527631
why dont you try splitting the large file into smalles ones and open. there are many free tools available to split large text files.
0
 
LVL 13

Assisted Solution

by:stergium
stergium earned 250 total points
ID: 36527643
hello.
use this one http://www.hjsplit.org/
0
 
LVL 13

Expert Comment

by:stergium
ID: 36527650
and take this as an advice.
that large log files dont serve any purpose...
please feed back
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 17

Accepted Solution

by:
Garry-G earned 250 total points
ID: 36527661
Also, there are editor/viewers available that only load a small portion of the file and display it, like e.g. http://www.swiftgear.com/ltfviewer/features.html (viewer only) - if it's a log file, I assume editing isn't the issue, but rather viewing, so this should suffice ...
Also, "grep"ping certain lines from it (if you know what you are looking for) is also an option ...
0
 

Author Comment

by:searchsanjaysharma
ID: 36527706
Thanks & kind Regards
Sanjay
0
 

Author Closing Comment

by:searchsanjaysharma
ID: 36527709
ok
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Introduction As you’re probably aware the HTTP protocol offers basic / weak authentication, which in combination with the relevant configuration on your web server, provides the ability to password protect all or part of your host.  If you were not…
Update (December 2011): Since this article was published, the things have changed for good for Android native developers. The Sequoyah Project (http://www.eclipse.org/sequoyah/) automates most of the tasks discussed in this article. You can even fin…
This tutorial covers a step-by-step guide to install VisualVM launcher in eclipse.
The viewer will learn how to use NetBeans IDE 8.0 for Windows to connect to a MySQL database. Open Services Panel: Create a new connection using New Connection Wizard: Create a test database called eetutorial: Create a new test tabel called ee…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now