Usb log
Author: m | 2025-04-24
USB log channel for embedded devices and command line tool - kiffie/usb-log
USB Log Lock Download - USB Log Lock
Hi @Michael_I Here is the example shows how to use the USB device to store the system log information. Note: Only connect one USB device. It must allow writing (it cannot be read-only) and use the FAT16, FAT32, EXT2, or EXT3 file system. This example was testedSet Up the USB System SettingsGo to CONFIGURATION > System > USB Storage > Settings > General. Select Activate USB storage service if you want to use the connected USB device(s).Set a number and select a unit (MB or %) to have the ZyWALL/USG send a warning message when the remaining USB storage space is less than the value you set here.CONFIGURATION > System > USB Storage > Settings > General Set Up the USB Log StorageGo to CONFIGURATION > Log & Report > Log Settings, select USB Storage and click Activate. Click Apply to save your changes.CONFIGURATION > Log & Report > Log Settings Go to CONFIGURATION > Log & Report > Log Settings > USB Storage > Edit. Select Duplicate logs to USB storage (if ready) to have the ZyWALL/USG save a copy of its system logs to a connected USB storage device. Use the Selection drop-down list to change the log settings for all of the log categories.CONFIGURATION > Log & Report > Log Settings Check the USG Log FilesConnect the USB to PC and you can find the files in the following path:\Model Name_dir\centralized_log\YYYY-MM-DD.log Hi @Username_is_reserved To use USB SSD for device to test please follow the type below.Note: Only connect one USB device. It must allow writing (it cannot be read-only) and use the FAT16, FAT32, EXT2, or EXT3 file system. This example was tested USB log channel for embedded devices and command line tool - kiffie/usb-log DRPU USB data theft protection tool monitors activities of USB mass storage devices configured on your PC. Software prevents data theft or block USB port access by unauthorized users of USB storage media in PC resulting in the prevention of data leakage. Software provides facility to send log files of recorded data via E-mail option or upload log via FTP server. USB data theft protection software is capable to run in hidden mode and allow you to secretly record details of USB device plug in and plug out activities on your computer. Software is suitable for all types of industries including small scale industries to large scale organization. Software provides an ultimate solution to restrict users from unauthorized access of important information, confidential files and folders, stored data, etc. through any type of USB drives on the computer. Above screenshot shows general settings including USB Access setting – This option allows you to enable and disable USB access port. Start-up settings – Select check box, if you want to run the software secretly at windows startup in hidden mode. Privacy settings – Select check box, if you need to hide the program from desktop, start -> all program, “Add and remove program” and hide program folder. Log settings – Use this option to set maximum size of text log and avoid over sizing of activities log. Log Format – Enable either “Standard” or “Detailed” option to view recorded log file. Security settings – Use this option to set password so that unauthorized user can not access the software settings. Run program from Start -> Run – Enter any keyword in given space so that you can access the hidden software window by using run command (By default software window will be accessed by entering the default keyword “USBProtection” in run command). Set all above options and then press “Apply” button to apply the software settings. Supported USB Storage Devices: Track activities of connection and removal of USB mass storage device. USB protection tool block USB port access using USB access settings. Provides facility to set password so that unauthorized user cannot access the software settings. Option to view log file in HTML as well as Text file format. Capability to capture photos of unauthorized user by enabling advance camera settings. Facility to sent log file of recorded data and picture via Email and also have an option to upload the log and captures image on FTP server using FTP settings. Secretly run and record USB storage media activities in hidden mode. Save detail log of the USB drive activities performed by unknown user on your computer for future usage. Facility to export and import all settings including general configuration settings, email settings and FTP settings if you want to install software in multiple machines. User friendly graphical interface and smoothly run on all windows edition including windows 8/7/vista/XP and windows server 2000/2003/2008 etc. Easy to install/uninstall software and no technical skill required to operate USB data theft protection tool.Comments
Hi @Michael_I Here is the example shows how to use the USB device to store the system log information. Note: Only connect one USB device. It must allow writing (it cannot be read-only) and use the FAT16, FAT32, EXT2, or EXT3 file system. This example was testedSet Up the USB System SettingsGo to CONFIGURATION > System > USB Storage > Settings > General. Select Activate USB storage service if you want to use the connected USB device(s).Set a number and select a unit (MB or %) to have the ZyWALL/USG send a warning message when the remaining USB storage space is less than the value you set here.CONFIGURATION > System > USB Storage > Settings > General Set Up the USB Log StorageGo to CONFIGURATION > Log & Report > Log Settings, select USB Storage and click Activate. Click Apply to save your changes.CONFIGURATION > Log & Report > Log Settings Go to CONFIGURATION > Log & Report > Log Settings > USB Storage > Edit. Select Duplicate logs to USB storage (if ready) to have the ZyWALL/USG save a copy of its system logs to a connected USB storage device. Use the Selection drop-down list to change the log settings for all of the log categories.CONFIGURATION > Log & Report > Log Settings Check the USG Log FilesConnect the USB to PC and you can find the files in the following path:\Model Name_dir\centralized_log\YYYY-MM-DD.log Hi @Username_is_reserved To use USB SSD for device to test please follow the type below.Note: Only connect one USB device. It must allow writing (it cannot be read-only) and use the FAT16, FAT32, EXT2, or EXT3 file system. This example was tested
2025-03-27DRPU USB data theft protection tool monitors activities of USB mass storage devices configured on your PC. Software prevents data theft or block USB port access by unauthorized users of USB storage media in PC resulting in the prevention of data leakage. Software provides facility to send log files of recorded data via E-mail option or upload log via FTP server. USB data theft protection software is capable to run in hidden mode and allow you to secretly record details of USB device plug in and plug out activities on your computer. Software is suitable for all types of industries including small scale industries to large scale organization. Software provides an ultimate solution to restrict users from unauthorized access of important information, confidential files and folders, stored data, etc. through any type of USB drives on the computer. Above screenshot shows general settings including USB Access setting – This option allows you to enable and disable USB access port. Start-up settings – Select check box, if you want to run the software secretly at windows startup in hidden mode. Privacy settings – Select check box, if you need to hide the program from desktop, start -> all program, “Add and remove program” and hide program folder. Log settings – Use this option to set maximum size of text log and avoid over sizing of activities log. Log Format – Enable either “Standard” or “Detailed” option to view recorded log file. Security settings – Use this option to set password so that unauthorized user can not access the software settings. Run program from Start -> Run – Enter any keyword in given space so that you can access the hidden software window by using run command (By default software window will be accessed by entering the default keyword “USBProtection” in run command). Set all above options and then press “Apply” button to apply the software settings. Supported USB Storage Devices: Track activities of connection and removal of USB mass storage device. USB protection tool block USB port access using USB access settings. Provides facility to set password so that unauthorized user cannot access the software settings. Option to view log file in HTML as well as Text file format. Capability to capture photos of unauthorized user by enabling advance camera settings. Facility to sent log file of recorded data and picture via Email and also have an option to upload the log and captures image on FTP server using FTP settings. Secretly run and record USB storage media activities in hidden mode. Save detail log of the USB drive activities performed by unknown user on your computer for future usage. Facility to export and import all settings including general configuration settings, email settings and FTP settings if you want to install software in multiple machines. User friendly graphical interface and smoothly run on all windows edition including windows 8/7/vista/XP and windows server 2000/2003/2008 etc. Easy to install/uninstall software and no technical skill required to operate USB data theft protection tool.
2025-04-06File on a TFTP server. You can optionally specify a password to protect the saved data.full-config usb []Back up the full system configuration to a file on a USB disk. You can optionally specify a password to protect the saved data.full-config usb-mode []Back up the full system configuration to a file on a USB disk (Global admin only). You can optionally specify a password to protect the saved data.ipsuserdefsig ftp [ []]Backup IPS user-defined signatures to a file on an FTP server. ipsuserdefsig tftp tftp Back up IPS user-defined signatures to a file on a TFTP server.{disk | memory} alllogs ftp [ ]Back up either all memory or all hard disk log files for this VDOM to an FTP server. The disk option is available on FortiGate models that log to a hard disk.The file name has the form: ___{disk | memory} alllogs tftp Back up either all memory or all hard disk log files for this VDOM to a TFTP server. he disk option is available on FortiGate models that log to a hard disk.The file name has the form: ___{disk | memory} log ftp {traffic | event | ids | virus | webfilter | spam | dlp | voip | app‑ctrl | netscan}Back up the specified type of log file from either hard disk or memory to an FTP server.The disk option is available on FortiGate models that log to a hard disk.{disk | memory} log tftp {traffic | event | ids | virus | webfilter | spam | dlp | voip | app‑ctrl | netscan}Back up the specified type of log file from either hard disk or memory to an FTP server.The disk option is available on FortiGate models that log to a hard disk.{disk | memory} log {ftp | tftp} netscanBack up the specified type of log file from either hard disk or memory to FTP or TFTP server.The disk option is available on FortiGate models that log to a hard disk.This example shows how to backup the FortiGate unit system configuration to a file named fgt.cfg on a TFTP server at IP address 192.168.1.23.
2025-04-03Automatically slow SPIclock down when read or write verification fails. Some commands are alwaysexecuted at 20 kHz.FTDI_LOG_LEVEL - sets csr-spi-ftdi log level, available log levels:quiet, err, warn, info, debug. Adding a ,dump option provides hexdumps of transferred data. Example: FTDI_LOG_LEVEL=info,dump. Default:warn.FTDI_LOG_FILE - specify log file name. Can be set to stdout to log tostandard output, or to stderr to log to standard error stream. Default:stderr.For other options see misc/transport-options.md.Communication speedReading or writing a 1 MB flash on HC-05 module takes about 60 seconds. DumpingHC-05 PS keys takes about 40 seconds.Running csr-spi-ftdi in a virtual machine slows things down presumably due tolatency added by USB virtualization. E.g. running csr-spi-ftdi under VirtualBoxslows transactions down about 4x times.Useful commandsThese commands should be executed from directory where BlueSuite is installedor this directory should be in your PATH.Display chip ID, firmware version and flash size: blueflashcmd -trans "SPITRANS=USB SPIPORT=1" -identifySave firmware backup (only for chips with flash, backup will include PSkeys): blueflashcmd -trans "SPITRANS=USB SPIPORT=1" -dump csr-fw-backupThis creates two files, csr-fw-backup.xpv and csr-fw-backup.xdv.Flash firmware from files csr-fw-backup.xpv and csr-fw-backup.xdv: blueflashcmd -trans "SPITRANS=USB SPIPORT=1" csr-fw-backupCollect debug logs: blueflashcmd -trans "SPITRANS=USB SPIPORT=1 SPIDEBUG=ON \ SPIDEBUG_FILE=C:\csr-debug.log FTDI_LOG_LEVEL=debug,dump \ FTDI_LOG_FILE=C:\csr-spi-ftdi-debug.log" -identifyLower SPI speed 5 times: blueflashcmd -trans "SPITRANS=USB SPIPORT=1 SPIMAXCLOCK=200" \ -dump csr-fw-backupSave chip settings (PS Keys) backup into csr-pskeys.psr: pscli -trans "SPITRANS=USB SPIPORT=1" dump csr-pskeys.psrMerge some settings from pskeys.psr to the chip: pscli -trans "SPITRANS=USB SPIPORT=1" merge pskeys.psrTroubleshootingDecreasing SPI speed using SPIMAXCLOCK option may help in caseof communication failures.Unable to start read (invalid control data) errors are usually harmless,since read attempts are retried. If You've got a pile of theese errors andprogrammer doesn't work - check connections, voltage levels, try to lower SPIconnection resistor values. Decreasing SPI speed using SPIMAXCLOCKoption may also help.WARNING: Attempt %d to read sector %d warnings are also harmless if they arenot result in error.Couldn't find LPT port error means You are using spilpt.dll driver insteadof usbspi.dll. Try importingmisc/spi-set-usb-transport.reg or adding-trans "SPITRANS=USB SPIPORT=1" option on command line.Lost %d of %d bytes of data in transit or ERROR: Download Failed, Sector %d - probably an indication of counterfeit FT232RL plugged into USB3.0socket. Try to replug into USB 2.0 socket. See Counterfeit FT232RLchips.Building for WineBuilding Wine DLL on 32-bit Debian/Ubuntu LinuxInstall build tools:sudo apt-get install -y build-essentialInstall development libraries:sudo apt-get install -y wine-dev libc6-dev libstdc++-dev libftdi-devBuild with command:make -f Makefile.wine allBuilding Wine DLL on 64-bit Debian/Ubuntu LinuxInstall build tools:sudo apt-get install -y build-essential gcc-multilib g++-multilibInstall 32 bit stuff:sudo apt-get install -y wine-dev:i386 libc6-dev-i386 libstdc++-dev:i386 libftdi-dev:i386Build with command:make -f Makefile.wine allInstallingInstall CSR BlueSuite in Wine. Find all instances of usbspi.dll installed andmove them out of the way:find ~/.wine -iname usbspi.dll -exec mv {} {}.orig \;Install Wine dll into the Wine libraries directory:sudo make -f Makefile.wine installAlternately You
2025-03-29