identification information, which is similarUser-AgentHTTP header. the header information includes the version of the web server and the current version of ASP. NET. In some cases, some HTTP headers are required. However, the web server itself does not need to identify the header information, which causes about 100 bytes to be transmitted each time. Well, I agree that 100 bytes alone is not a big number, but it cannot be underestimated when it is tr
In IIS has a concept called the host head, we basically have mastered, there is a concept called HTTP head, some students have asked me this question, in fact, the HTTP header more involved in the software of Dongdong.
The most intuitive HTTP header is when we create an HTML page in Frotpage or Dreamweaver each time, the code on this page has one line of code:
In fact, this is an HTTP header information, the beginning of the HTML page will have a si
performance issues, or what needs to be improved.What information is included in the IIS logsI said earlier that "IIS logs provide the most valuable information", what are the information? Let's look at this:Here's the record:1. At what point the request occurred,2. Which client IP has access to the port of the server IP,3. What is the client tool type, what version,4. The URL of the request and what the q
Roles and settings of IIS host headers
For various reasons, we sometimes need to create multiple web sites on one IP address. In iis5, we may achieve this through simple settings. In IIS, each web site has a unique identifier consisting of three parts to receive and respond to requests:(1) IP Address(2) Port Number(3) Host header name. In
Asp.net|iis saw a drunk solution thousand sorrow of the ASP.net version of the IIS directory, think of the previous thought to the code to IIS to increase the host head, but has not to study, today, while interest, decided to solve the problem.
for the blog site, if you need to provide users with level two domain support, and the Web program is not running the
IIS log analysis is our Asp.net
Program Personnel must understand the knowledge, because the website we develop is based on the IIS server. When Website access is slow
Code In addition to the optimization program code, IIS logs are another way to find slow websites!
The location where
First, locate the database for IIS. The default is the MetaBase.xml file under C:\WINDOWS\system32\inetsrv.If you can't find it, right-click Site-All services-to save the configuration to a file. The path that appears is the path where the IIS database configuration file MetaBase.xml is located.Find the file, do not hurry to change the file, you have to determine whether you can modify the file.How to deter
IIS log causes the disk to be full. iis log Disk
Only IIS is deployed on a server, and the application directory is on disk D. The size of disk C (97.5 GB) is full.
Display All system files and hidden files, and select all the C drive files and folders to view the ca
The server has recently suffered hacker intrusion. Intruders are skilled, delete IIS log files to erase traces, you can go to the Event Viewer to look at the warning message from W3SVC, often find some clues. Of course, for Web servers with very large access, it is almost impossible to rely on manual analysis-there's too much data! A Third-party log analysis tool
Download |iis| Log Analysis
IIS Log Analysis tool
You can consider using open source Awstats to analyzeThe following is my installation notes, I hope you can have a referenceAwstats's installation notes under IIS6.0What is Awstats? Awstats is a Perl-based Web
Ways to turn off Httperr
Run input regedit enter Registry Editor[Hkey_local_machine\system\currentcontrolset\services\http\parameters]
right mouse button to create new DWORD value enableerrorlogging reboot the server
"Enableerrorlogging" =dword:00000000
After the restart, 2003 no longer write to the Httperr log file, you can see the server CPU footprint significantly reduced!
C:\WINDOWS\system32\LogFiles\ solution to the problem of C disk space d
First, we will introduce the default log location. Only when we know the traces we leave on the server can we erase the traces we leave on the computer, and the log is where we leave the traces.Security log file: C: \ WINDOWS \ system32 \ config \ SecEvent. EvtSystem log file: C: \ WINDOWS \ system32 \ config \ SysEven
Code highlighting produced by Actipro CodeHighlighter (freeware)http://www.CodeHighlighter.com/--> Logparser - O: CSV" Select C - IP, Count (C - IP) From Group By C - IP" > C: \ cccip.csv
C-IP
Applications: Mainly used with virtual host, can also be used for personal server
Background: 2005 a month, the normal operation of the virtual host crashed, let the computer room on duty to restart a number of times, are not, the display into the system to see, tips: C disk space is insufficient, the middle of the night to go to the room to deal with, to the computer room after the first break network, and then into the system found two places have problems, C:\WINDOWS\ System32\logfiles file
For a website that requires long-term maintenance, it is meaningful to make the website run stably for a long time.Some problems that are not exposed in the development phase may occur in the O M phase, which is also normal.Sometimes, we want to constantly optimize the website so that the website can respond to user requests more quickly,These events occur in the O M phase after development.
Unlike the development phase, the O M phase cannot allow debugging.Program, Discover various problem
Application scenarios: Mainly used with virtual hosts, but also for personal servers
Background: a vm that has always been running normally crashed on a certain day of June 1, 2005, so that the personnel on duty in the IDC cannot restart the host several times. The system displays the VM and prompts that the disk C is insufficient, in the middle of the night, I had to go to the data center for processing. after going to the data center, I first cut off the network and went into the system to fi
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.