Monday, July 26, 2010

From customer satisfaction to customer trust



What is customer satisfaction

In general, customer satisfaction is the customers and employees of enterprises of products and services directly to comprehensive evaluation, is a customer of the company, products, services and staff recognition. Customers based on their value judgments to evaluate the products and services, therefore, PhilipKotler that "satisfaction is the feeling state of a human level, it comes from the idea on a product's performance or output and carried out by people's expectations comparison. " From the business point of view, customer service goal is not just limited to customer satisfaction, so customer satisfaction is the first step in marketing management. President of the United States maintain the chemical, William. Taylor said: "Our interest lies not only let customers receive satisfaction, we have to dig those customers that can enhance the value of our relationship things." In the long-term business and customer partnerships, enterprises to provide the customers more than their expectations, "customer value", allowing customers to purchase in each process and post-purchase experience can be satisfied. Each customer satisfaction will increase the trust of the enterprise, enabling companies to obtain long-term profitability and development.
For businesses, if the enterprises are satisfied with the products and services, customers will feel them the consumer through word of mouth to spread to other customers and spread the product awareness and increase corporate image for long-term development 涓嶆柇 injected into Xin power. But the real problem is that companies tend to customer satisfaction equal to the trust, or even "customer loyalty." In fact, customer satisfaction, customer trust is a prerequisite, customer confidence is the result; customer satisfaction is a product, the positive evaluation of a service, even if a business customer satisfaction is only based on their acceptance of products and services that he satisfaction. If an imperfect one's products and services, he also dissatisfied with the company, and that is, it is a perceptual evaluation. Customer trust is a customer of the brand product and have trust in the brand business, they can rationally face the success of brands and adverse. Bain & Company survey of the United States, in the claimed product and company satisfied even satisfied customers, 65% 85% of the customers will turn to other products, only 30% 40% of customers will again buy the same products or similar products the same type.

What is customer trust

Customer trust is a corporate customer, a brand of product or service recognition and trust, which is continually enhanced customer satisfaction results, and customer satisfaction tend to feel different sensibility, customer trust is the customers on the basis of rational analysis sure, the recognition and trust. Generally speaking, customer trust can be divided into three levels:
Cognitive trust - it is directly based on the formation of products and services, since such products and services just to satisfy his individual needs, this basic level, living trust, it may be because the sense of fun, the environment changes in the transfer;
Affective trust - after using the products and services obtained lasting satisfaction, it may form a preference for products and services;
Behavior trust - only available in enterprise products and services become essential customer needs and enjoy, the behavior will be the formation of trust, its performance is the maintenance of long-term relationships and repeat purchase, as well as corporate and product focus, and In this concern the consolidation of confidence in the search for information or confirmation of no confidence in the information to prevent wronged.
Over the years, managers have made profits that the market share is the driving force behind the mid-70s of the 20th century PIMS (ProfitImpactofMarketShare) model supports this view. However, Professor EarlSasser not find this view is correct, because he found a more profitable and rapid growth is closely related factor is customer trust, rather than market share.

A specious argument
Theory in marketing management, customer loyalty is a widely used concept, but customer loyalty is really just a misunderstanding.
When marketing experts that "customer loyalty" concept, the enterprise management concept is first large-scale production, that is the first enterprise customer needs according to their own understanding of the design product, and then through a long period of mass production cost attract customers to buy. Throughout the process, the business is led in the active position; customers as the recipients of enterprise products, enterprises can only accept the "they" design, products, customer selectivity. Environment, especially in shortage, customers had to repeat purchase the same product. This repetition gives the wrong impression to buy a "customer loyalty."
In fact, in the era of personalized emotional consumer, product variety, product homogeneity malpractice, product life cycles can not make long-term customer and a product of a corporate "loyalty."
On the other hand, the object of customer loyalty is the company or products, so customer loyalty is a customer of the company or product loyalty, which is a product-centric products, the situation should be the business on customer loyalty. Only change this concept of customer service to enable enterprises to achieve maximum customer value.
Customer loyalty marketing guidance may result in: big business or product alone respect, from the customer, and poor service; company aims to achieve sales, consumer abuse cases, trafficking in customer goodwill, to lure customers consumption; sales process quick success, do not speak credit, unscrupulous, and so on.

Professor Daniel "bucket"
Old customers are enterprises, products, services trust and repeatedly purchase products or receive services groups. In a bid to increase market share and increasing sales pressure to complete, more or less to find new customers as the focus of marketing management, while ignoring the role of the old customers. In fact, this is a misunderstanding. DanielCharmich professor enterprises with buckets to liken this behavior. He was professor of marketing class hours, the board drew a barrel, then the bottom of the barrel painted many holes, and to these holes marked with the name: rude, poor service, untrained staff, poor quality, poor selectivity so, he barrels out of customers than to. He pointed out that in order to maintain the existing business turnover to keep the top from the barrel into the "new client" to complement the loss of customers, this is an expensive process with no end. Therefore, more and more companies began to improve service quality to maintain old customers, because the plug bucket brought far from the "customer number", but "customer quality" improvement.
Old customers are the most valuable asset, an old customer lifetime value is enormous. According to the survey, a favorite pizza from the people who get lifetime income is about 8000 U.S. dollars, gained from a Cadillac owner's lifetime income is 332,000 dollars.
Customers trust the considerable economic benefits of this in other industries has been proven. In recent years, service industries, such as software and banking survey showed that 5% increase in customer confidence, corporate earnings could rise 25% to 80%. If a company consistently return value to customers and win the loyalty of customers, its market share and profitability will increase, but to attract customers and customer service costs will decline. Companies will therefore invest the extra profits obtained in a series of new activities, for example, reward old customers, to provide customers with better service, improve staff remuneration, etc., thus triggering a chain reaction, the formation of "Customer trust in corporate profits "virtuous circle.
Customer trust in the benefits to the enterprise are manifold. Bring repeat customers confidence to purchase, the customer repeat purchase with the increased revenue, but also to keep old customers longer, larger purchases 灏? for recruiting customers to reduce costs to enable enterprises to lower costs, a study for a new customers about the cost of keeping an old customer than the cost of more than several times, and the strong competition in mature markets, companies gain new customers great difficulties; as "reputation effect", the old customers would recommend others to buy in order to increase new customers; enterprises have rich consumer experience, familiar with the old customer service more efficient, more economical; customer confidence and economic efficiency of the increase will help improve the working conditions of employees, improve employee satisfaction, their sense of belonging subsequently increased, in turn, can increase efficiency, reduce recruitment and training costs, reduce staff turnover loss, further reducing the costs, thus creating an enhanced customer trust in a virtuous circle effect.

Customer bribery can not cultivate customer trust
There is a popular business practice, hopes to discount or rebate to attract customers, retain customers, and to such activities as "loyalty marketing", which essentially is a customer of bribery, the trust has no role in cultivating customers . As noted in the report of the United States Food Marketing Institute, the lowest rate of new customers in Switzerland (7%), the United Kingdom was the highest (24%), but low transfer rate of the Swiss customer loyalty marketing campaign is the lowest participation rate (15%), while high transfer rate of the UK customer loyalty marketing the highest participation rate (83%). Customers did not participate in such activities, there are 12.7% of people believe that these activities a waste of time, in order to obtain these discounts not worth it. 35.5% of the customers said that if there is no such activities, they would still buy the same amount of stuff, with 87.5% of customers claim that without these activities, they will still buy goods from shops. This is from a side note, the maximum income customers who bribery is essentially the general business customers, they are real profiteers are not going to trust in business, corporate more harm than good in such activities.
But the enterprise market for certain purposes by way of discount or rebate to attract customers is very effective, and it is desirable, such as clearance, rapid return on investment, the seasonal transition, to avoid the delay caused the loss (such as water products, fresh fruit, etc.) Through the activities of the key competitive advantage, and so on. But long-term application of this strategy will result in a price war, resulting in multi-impaired, such as color TV industry. In order to gain a competitive business or should be adopted to improve the unique customer value, gaining customer trust, such as Haier.

From customer satisfaction to customer trust

Customer satisfaction and customer trust are the two dimensions. If customer satisfaction is a kind of value judgments, the customer trust is the behavior of customer satisfaction.
Therefore, we say that customer satisfaction, customer trust only just upgraded to the first step, and continuously enhanced customer satisfaction is customer trust. Meanwhile, the need to clear that customer satisfaction does not necessarily cause the development of customer trust and satisfaction from customer to customer trust, enterprises need to do many things.
Customer trust in the promotion of factors, personalized product and timeliness of services are two decisive factors. Personalized products to enhance the customer experience awareness and to foster awareness of customers trust; personalized products and services enable customers time dependence, and training emotional trust; only personalized products and services can be timely meet customer needs change, customers will trust act; customers can spontaneously trust, and customer trust requires companies to train with actual actions.

To provide customers with personalized products and services
Personalized marketing products from the most upstream start. Higher level of customer was not satisfied with batch produced products, they can reflect the personality of the products for more favor. As the technology, products and individuality of the scale of economic production are no longer opposing the conflict, companies can stay in the same time, some economies of scale, to provide customers Manzu their Butong requirement with individualized products to customer base satisfactory experience, modern production theory of mass customization is the performance of such thinking, It can meet the specific needs of individual customer groups, but also reduce production costs.
With the advances in production technology, flexible manufacturing system has been able to produce according to customer requirements personalize personalized customized products. For example, Panasonic bicycle industry companies, robots, computers and workers together in a vehicle assembly line to produce a customized bike. Each vehicle are based on customer's build, weight and loving special price higher than 10% of ready-made models. Matsushita's experience has infiltrated into many industries in Japan, they created a mass production of a new era of personalized products. The DELL through the customization to meet the individual needs of different customers, so that enterprises become a top leap of IT suppliers and service providers.
According to research, customer demands for personalized products mainly in shape, color, size, type and special auxiliary functions, while the basic function of the product demand is basically the same, meaning that most of the products differences, mainly in supporting diversification rather than on the basic functions, as if either the washing machine wash sweet potatoes or washing underwear in the washing machine, cleaning function is basic, but manual control, computer control is the customers own likes. So companies in the realization of personalized products, you can put more focus on product design and supporting the shape function, which for most businesses is not very difficult:
(1) face to face to understand the true idea of customers, according to intention to forecast customer demand for products;
(2) let customers participate in product planning and design, so customers feel that the product is tailor-made for him;
(3) customized for agile manufacturing, allowing customers to always feel that his personal enjoyment;
(4) business profile and reputation information so that customers are receiving this product and enjoy the value of business services are the embodiment;
(5) prior to customer acceptance of products and services to make customers feel convenient;
(6) lift the doubts of customers, increasing customer personal feelings;
(7) timely delivery;
(8) sales care.

Enhanced Customer Experience
LewisCarbone that customers care about the feelings of doing business with you, especially for a product or a business customer with feelings, it is difficult to change his mind with a discount. They purchase products and services are receiving an experience, they frequently patronize a company's products and services because the company is actually creating a cordial than the competition but also the experience, therefore enhancing the customer experience is to develop customer trust important way.
Enterprise from the following aspects:
(1) to establish the concept of customer service. "Courteous and smiling service" does not mean quality service, this is only the attitude of the requirements. Enterprises to achieve a comprehensive quality service for customer service must implement the concept of marketing activities to the entire process. IBM proposed the "IBM means service" business philosophy, for each employee for the training of corporate philosophy and help them understand the enterprise's mission is to provide customers with the best services to achieve customer satisfaction levels, and to staff Recognizing and dealing with customers, not just to sell products, but to solve practical problems for customers. IBM, with its perfect service and the customer is responsible for the spirit of the people had their full trust.
(2) to develop reasonable and effective service quality standards. Different companies, different products or services will have different specific features of the standard rules requirements, such as Haier, "12345" rule: a document-site services to produce a work license; two public open standardized charges in accordance with standard fees, maintenance or installation of public records to produce a single and after the service, please sign the views of customers; three are in place to clear the on-site service in place, power demonstration test machine in place, it clear to their customers to use the knowledge in place; four customers are not allowed to drink water pumping customers do not smoke, do not eat rice customers, not customers the gift; 5 one handed a business card, wearing a pair of slippers and carrying a mattress, and carrying a piece of cloth, giving a small gift.
Effective service quality standards should have the following characteristics:
(1) starting from the needs of customers.
Specific. Enterprise should determine the specific quality standards as far as possible, to facilitate implementation.
Received. Employees understand and accept the company established service quality standards, will be effective implementation and implementation. Businesses can mobilize their staff involved in developing quality standards, such standards to determine not only more accurate, but can get the support of staff.
(2) emphasis. If the established quality standards are too cumbersome and not bound to make employees understand the key requirements needed to achieve.
Have some flexibility. The basic principles of Tong Yi's premise, give employees a certain degree of flexibility to enable him to the specific conditions according to different customers flexible, targeted to provide special services.
Both practical and challenging. If the business service quality standards set too high, employees can not reach, they are bound to discontent; If the standard is too low, they can not motivate employees to improve service quality. Both practical and challenging quality standards before they can motivate people to do service work.
(3) to make commitments to customers must be fulfilled. "Good as gold" is responsible for the company, is the value for the customer. Many of the "good as gold," contributes to customer trust, the loss of a customer's departure date result.
(4) service quality assessment and improvement. Good service quality inspection, assessment work in order to further improve services to promote the work of staff. Company employees regularly assessing the quality of service, and examination results and timely feedback to the staff, helping staff to enhance service quality. In addition, enterprises should be based on assessment results, reward outstanding staff, research to improve measures to continuously improve service quality.
Service quality is the core of the system and basic services, high-quality service can enhance the credibility of enterprises and enhance the value of customer service satisfaction, generate favorable word of mouth effect, and inspire the morale of the staff and eventually strengthen customers trust the company.

Customer Relationship Management
Customer relationship management is to cultivate and maintain customer trust means. Good customer relationship management not only allows companies to better retain existing customers, but also enable enterprises to find back the lost customers. As the world's largest, to visit the largest and most profitable online bookstore Amazon, the face of a growing number of competitors is a magic weapon to maintain enduring customer relationship management. When you first buy Amazon books, its system will record the purchase or browse through the book, when you re-enter the bookstore, the system will recognize your identity based on your preferences recommend the books. The number of times you go to the bookstore more understanding of the system you have more, and he became able to provide you with better service, so Amazon has always maintained a 65% keep returning.
Customer relationship management is becoming more and more enterprises to improve the quality of customer service essential magic, it can improve the way the information submitted, strengthening communication with customers, streamline customer service processes, improve customer service quality. According to the survey, nearly 80% of companies are trying to establish their own business for customer relationship management system.







相关链接:



Assembly INSTRUCTIONS and the machine code of each conversion



Good Gallery And Cataloging Tools



Ministry of Finance denied the procurement of the Green Dam said the Ministry Of Industry is the onl



What Is Mkv File



Mapgis basic knowledge and simple learning materials



mpg To dat



video file converter



Science - Screen Savers Expert



Toyota Authorized Dealer



Workplace competitiveness "soft SKILLS"



CONVERT .avi to .wmv



"Dragon Century: Origins," Rogue gave him experience flow culture



e-cology In the Pan Micro Series 46



Monday, July 12, 2010

MS Proxy Usage (1)



http://www.soft6.com/html/news/3/34856.shtml
Proxy granted permission to the new user group

www.soft6.com

Open the IIS Service Manager, and then open the Web Proxy properties page. I will discuss in the MS Proxy Server in how to grant permissions to a group. Open the Web Proxy Server Properties page, select Permissions page.
UTF-8

By default, MS Proxy Server does not configure the permissions for any license agreement. Therefore, no users can WebProxy (or WinSock Proxy) outbound access to Internet, to give a new Proxy user group to grant access, in need of the following:



MS Proxy Usage (1)


Proxy granted permission to the new user group

Open the IIS Service Manager, and then open the Web Proxy properties page. I will discuss in the MS Proxy Server in how to grant permissions to a group. Open the Web Proxy Server Properties page, select Permissions page.

By default, MS Proxy Server does not configure the permissions for any license agreement. Therefore, no users can WebProxy (or WinSock Proxy) outbound access to Internet, to give a new Proxy user group to grant access, in need of the following:

1. In the Protocol drop-down box, select the one you wish to specify the access agreement.
2. Point "Add" button, will pop up a dialog box to group or user to access list of this agreement.


1. The drop-down table list allows you to select the name of any domain, external domain can trust the parallel connection or other domain account.
2. Default list only local groups and global groups, you can list all the users, individually configure users, but network management for large and medium term, will be a nightmare. If possible, try to configure the user with a working group.


In the Add Users and Groups dialog box on the "Members" button to show the current list of selected members of the group




Control access from the Internet to stop

1. In the Protocol drop-down box, select the one you wish to specify the access agreement.
After installing the Proxy Server, NT, there are two changes to expand the security. The first change is the IP forwarding. IP forwarding is a TCP / IP properties in a setting, it is closed. It controls whether the NT transmit IP packets between the network interface (for example: from the network card to connect between RAS). When a permanent Internet connection network configuration under the premise, and the Bureau Online configured for each workstation's Internet direct access to their own time, IP forwarding must be set to valid, so the workstation can send their packets to the Internet, contrary no exception. Connected to the Internet, that Taiwan NT Server, it will lock all of their traffic stops

Further restrict the Internet, even from the client to NT Server, MS Proxy Server banned all do not have permission to set IP port listening, this means that any run on NT Server on the Internet service applications (such as FTP server, Telnet server, or POP3 server) can not hear any traffic outside the pit, except for these agreements set the WinSock Proxy rights. Web Proxy listener on port 80 traffic only, if the Web Proxy in support of the agreement to any set of permissions, you can listen on port 80 traffic stop.
2. Point "Add" button, will pop up a dialog box to group or user to access list of this agreement.



In the MS Proxy Server isolate it in its own domain
1. The drop-down table list allows you to select the name of any domain, external domain can trust the parallel connection or other domain account.

If you want to proxy access settings for your network security features very high, there is a method that is set to run the Proxy Server's NT server as its own domain controller in the basic domain. Then in the Proxy domain and network domain to build a one-way trust relationship between the. Proxy domain set? Trusted network domain, network domain, but do not trust Proxy domain, this setting will be a better place restrictions on the network domain in the Proxy server and access to all the other systems.

When the network is not set as a domain, this approach can be a very good effort. But compared to the terms of the work, run the Proxy Server's NT 鏈嶅姟鍣?can be set to its own domain of the basic domain controller, which can provide better security control, Bing Ju Ye Hui for future expansion easier.
2. Default list only local groups and global groups, you can list all the users, individually configure users, but network management for large and medium term, will be a nightmare. If possible, try to configure the user with a working group.


Proxy Server activity monitoring

Two basic methods: the first one of the most commonly used logging is a standard comma-separated text file, or through the ODBC driver to connect to SQL on. The second method is to monitor via SNMP. This requires the NT SNMP service installed. The purpose of SNMP is distributed, and sometimes control data to a remote workstation in order to run on NT Server on the service can be monitored and controlled outside the local

In the Add Users and Groups dialog box on the "Members" button to show the current list of selected members of the group




Proxy Server can record diary information to a text file, or through the ODBC driver, the information recorded in a data engine. Text log is a very simple process, but also allow network administrators to have a quick way to view the Proxy Server component on the events (Web Proxy and WinSock Proxy). Logs can be used to generate the day, week or month's report.

Control access from the Internet to stop

Text file records


After installing the Proxy Server, NT, there are two changes to expand the security. The first change is the IP forwarding. IP forwarding is a TCP / IP properties in a setting, it is closed. It controls whether the NT transmit IP packets between the network interface (for example: from the network card to connect between RAS). When a permanent Internet connection network configuration under the premise, and the Bureau Online configured for each workstation's Internet direct access to their own time, IP forwarding must be set to valid, so the workstation can send their packets to the Internet, contrary no exception. Connected to the Internet, that Taiwan NT Server, it will lock all of their traffic stops
By default, Proxy Server to log all the event information to a text file, the file exists the following areas:

Further restrict the Internet, even from the client to NT Server, MS Proxy Server banned all do not have permission to set IP port listening, this means that any run on NT Server on the Internet service applications (such as FTP server, Telnet server, or POP3 server) can not hear any traffic outside the pit, except for these agreements set the WinSock Proxy rights. Web Proxy listener on port 80 traffic only, if the Web Proxy in support of the agreement to any set of permissions, you can listen on port 80 traffic stop.
n Web Proxy Logs: c: winntsystem32w3plogs

In the MS Proxy Server isolate it in its own domain

If you want to proxy access settings for your network security features very high, there is a method that is set to run the Proxy Server's NT server as its own domain controller in the basic domain. Then in the Proxy domain and network domain to build a one-way trust relationship between the. Proxy domain set? Trusted network domain, network domain, but do not trust Proxy domain, this setting will be better restricted in Proxy server and network domain access between all the other systems.

When the network is not set as a domain, this approach can be a very good effort. But compared to the work, the NT server running Proxy Server can be set to the basic domain of its own domain controller, which can provide better security control, and for the future expansion will be easier.

Proxy Server activity monitoring

Two basic methods: the first one of the most commonly used logging is a standard comma-separated text file, or through the ODBC driver to connect to SQL on. The second method is to monitor via SNMP. This requires NT SNMP service installed. The purpose of SNMP is distributed, and sometimes control data to a remote workstation in order to run on NT Server on the service can be monitored and controlled outside the local
n WinSock Proxy Logs: c: winntsystem32wsplogs

Proxy Server can record diary information to a text file, or through the ODBC driver, the information recorded in a data engine. Text log is a very simple process, but also allow network administrators to have a quick way to view the Proxy Server component on the events (Web Proxy and WinSock Proxy). Logs can be used to generate the day, week or month's report.

Text file records

By default, Proxy Server to log all the event information to a text file, the file exists the following areas:
n Web Proxy Logs: c: winntsystem32w3plogs
n WinSock Proxy Logs: c: winntsystem32wsplogs

Usually every day automatically create a new log file, you can change weekly or monthly. When using the log file reaches the specified size, it will build a new log file

In the Web Proxy and WinSock Proxy services in the property, there is a log table. Two services are the same table.

After the completion of a log file when its name is based on the current date. For example, the log file is December 5, 1996-built, log file name is: w3961205. Log files in two formats: regular and detailed, the conventional format of the log is short, do not include all of the data elements in detail log contains a complete data model for conventional logs.

Detailed log sample

The definition of data fields
In order to understand the contents of the log file, here is the log file in the definition of each field, its order and you see the same log file. Remember that Web Proxy and WinSock Proxy log file format is the same. Conventional log does not omit any data field, only to reduce some amount of information.

1. Client-IP (ClientIP): This field client to connect to the Proxy IP addresses. When the Web Proxy activation of a buffer task (to be connected to the external WEB to refresh the contents of the buffer), will own an entry to the log file records, this field data is the Web Proxy Server own IP.
2. Client user name (ClientUserName): If the Proxy client user name is known, it will show in this field. If you are an anonymous user, the value of this field is the "anonymous".
3. Client Agent (ClientAgent): This field is a proxy client to access Proxy server name. If the Web Proxy client, then the client application will connect the hair out of this information to the Web Proxy. If the WinSock Proxy client workstations on the WinSock client software will determine the actual name run through the control channel is passed to the WinSock Proxy. The field also contains important information about the guest operating system, the information agent name with a colon and separated. For Web Proxy clients, this information may be passed to the server in the connection in advance (or may not). For WinSock clients, this information is always passed through the WinSock client software to the server. An operating system to pass information from the Web Proxy client example: compatible; IE3; WIN95. Operating system information transmitted by a WinSock Proxy client looks like this: 2:4:0, which is code for Windows95. The following table is a WinSock Proxy log details the operating system code.


0:3.1 Windows 3.1
0:3.11 Windows for Workgroups
0:3.95 Windows 95 (connection made by a 16-bit client application.)
1:3.11 Windows for Workgroups (connection by a client using the Win32s extensions.)
2:4.0 Windows 95 (connection made by a 32-bit client.)
3:3.51 Windows NT 3.51
3:4.0 Windows NT 4.0


Web Proxy complete record of the field values of the sample is: Mozilla/2/0 (compatible; MSIE 3.0; Windows 95). WinSock Proxy complete record of the field values of the sample is: WS_FTP32.EXE: 2:4.0. Web Proxy records of the exact value of the field based on the client application sent in to do proxy connection to the Web Proxy header information to reflect those changes
4. Certification status (ClientAuthenticate): This field is a recognition that customers had connections, Y values on behalf of clients through the NT security database check.
5. Record date: Proxy Server to establish which record is the date
6. Record time (LogTime): Proxy Server to establish which records the time
7. Server name (ServerName): Logging in to the server name. When you select more log records, WspSrv behalf of WinSock Proxy, W3Proxy on behalf of Web Proxy. When choosing conventional logging, the field is two values, one on behalf of Web Proxy, 2 on behalf of WinSock Proxy.
8. Proxy Name: The NT servers running Proxy Server name. This is a NetBIOS name.
9. Submitted to the server name (Referring Server Name): This is the next in the current version is a reserved field. After the Proxy Server version will use it to save down the name of Proxy Server, the server is connected to the current Proxy Server. This mutual collaboration in a cascading Proxy server farm in a very useful
10. Objective Name (DestHost): This field is pointed out that the client connection through Proxy Server domain name. But not always the name of client connection requests, because the Internet to connect some sites automatically forwarded. If the information sent from the buffer (only the Web Proxy case), then the field is no content.
11. Purpose of IP address (DestHostIP): This field is saved customers through Proxy Server to connect the host IP address, the same as previous field, if given the information from the Web cache, the field is no content.
12. Destination port (DestHostPort): Proxy Server and the target site in the connection between the TCP / IP port. If no data is sent to the client, nor details of the field, the field is only used by the Web Proxy. WinSock Proxy No content in this field.
13. Processing time (ProcessingTime): Proxy Server for the client sending the message that it takes time (milliseconds). Once the proxy server result code received from the destination site, the clock stopped. If the information sent by the Web Proxy buffer in the field pointed out that the location information sent to the client how much time.
14. Send bytes (BytesSent): Proxy Server to send to the client in bytes. If there is no information to the client, this field may be empty. Only Web Proxy use of the field.
15. Receive bytes (BytesRecv): This field records Proxy Server from the client the number of bytes received. The size of the client the number of requests issued to Proxy. Like the previous one field, the field is only used by the Web Proxy. If the field in the Web Proxy log is empty, the client may not send data or do not provide size information.
16. Protocol name (Protocol): In the Web Proxy log, the contents of this field is: HTTP, FTP, Gopher, or Secure, according to the customer's agreement to use different. In the Winsock Proxy logs, the field is the number of client connections commonly used protocol (for example: SMTP connection of 110)
17. Transport: between the client and the Proxy Server using the transmission method. Web Proxy connection is always TCP. Winsock Proxy connection is TCP, UDP or IPX / SPX.

Usually every day automatically create a new log file, you can change weekly or monthly. When using the log file reaches the specified size, it will build a new log file

In the Web Proxy and WinSock Proxy services in the property, there is a log table. Two services are the same table.

After the completion of a log file when its name is based on the current date. For example, the log file is December 5, 1996-built, log file name is: w3961205. Log files in two formats: regular and detailed, the conventional format of the log is short, do not include all of the data elements in detail log contains a complete data model for conventional logs.

Detailed log sample

The definition of data fields
In order to understand the contents of the log file, here is the log file in the definition of each field, its order and you see the same log file. Remember that Web Proxy and WinSock Proxy log file format is the same. Conventional log does not omit any data field, only to reduce some amount of information.

1. Client-IP (ClientIP): This field client to connect to the Proxy IP addresses. When the Web Proxy activation of a buffer task (to be connected to the external WEB to refresh the contents of the buffer), will own an entry to the log file records, this field data is the Web Proxy Server own IP.
2. Client user name (ClientUserName): If the Proxy client user name is known, it will show in this field. If you are an anonymous user, the value of this field is the "anonymous".
3. Client Agent (ClientAgent): This field is a proxy client to access Proxy server name. If the Web Proxy client, then the client application will connect the hair out of this information to the Web Proxy. If the WinSock Proxy client workstations on the WinSock client software will determine the actual name run through the control channel is passed to the WinSock Proxy. The field also contains important information about the guest operating system, the information agent name with a colon and separated. For Web Proxy clients, this information may be passed to the server in the connection in advance (or may not). For WinSock clients, this information is always passed through the WinSock client software to the server. An operating system to pass information from the Web Proxy client example: compatible; IE3; WIN95. Operating system information transmitted by a WinSock Proxy client looks like this: 2:4:0, which is code for Windows95. The following table is a WinSock Proxy log details the operating system code.


0:3.1 Windows 3.1
0:3.11 Windows for Workgroups
0:3.95 Windows 95 (connection made by a 16-bit client application.)
1:3.11 Windows for Workgroups (connection by a client using the Win32s extensions.)
2:4.0 Windows 95 (connection made by a 32-bit client.)
3:3.51 Windows NT 3.51
3:4.0 Windows NT 4.0


Web Proxy complete record of the field values of the sample is: Mozilla/2/0 (compatible; MSIE 3.0; Windows 95). WinSock Proxy complete record of the field values of the sample is: WS_FTP32.EXE: 2:4.0. Web Proxy records of the exact value of the field based on the client application sent in to do proxy connection to the Web Proxy header information to reflect those changes
4. Certification status (ClientAuthenticate): This field is a recognition that customers had connections, Y values on behalf of clients through the NT security database check.
5. Record date: Proxy Server to establish which record is the date
6. Record time (LogTime): Proxy Server to establish which records the time
7. Server name (ServerName): Logging in to the server name. When you select more log records, WspSrv behalf of WinSock Proxy, W3Proxy on behalf of Web Proxy. When choosing conventional logging, the field is two values, one on behalf of Web Proxy, 2 representatives of WinSock Proxy.
8. Proxy Name: The NT server running Proxy Server name. This is a NetBIOS name.
18. Operation: Record transfusion Proxy Server implementation of the operation. Web Proxy to record GET, PUT, POST and HEAD. WinSock Proxy to record Connect, Accept, SendTo, RecvFrom and GetHostByName.
9. Submitted to the server name (Referring Server Name): This is the next in the current version is a reserved field. After the Proxy Server version will use it to save down the name of Proxy Server, the server is connected to the current Proxy Server. This mutual collaboration in a cascading Proxy server farm in a very useful
10. Objective Name (DestHost): This field is pointed out that the client connection through Proxy Server domain name. But not always the name of client connection requests, because the Internet to connect some sites automatically forwarded. If the information sent from the buffer (only the Web Proxy case), then the field is no content.
11. Purpose of IP address (DestHostIP): This field is saved customers through Proxy Server to connect the host IP address, the same as the previous field, if given the information from the Web cache, the field is no content.
12. Destination port (DestHostPort): Proxy Server and the target site in the connection between the TCP / IP port. If no data is sent to the client, nor details of the field, the field is only used by the Web Proxy. WinSock Proxy No content in this field.
19. Object name (Object Name): This field records the name of the object before the Web Proxy, WinSock Proxy log of the field is empty.
13. Processing time (ProcessingTime): Proxy Server for the client sending the message that it takes time (milliseconds). Once the proxy server result code received from the destination site, the clock stopped. If the information sent by the Web Proxy buffer in the field pointed out that the location information sent to the client how much time.
14. Send bytes (BytesSent): Proxy Server to send to the client in bytes. If there is no information to the client, this field may be empty. Only Web Proxy use of the field.
20. Object MIME: Web Proxy to use the field only. Records received by the MIME type of object. If the target server is not defined or not supported, this field will contain the following strings:
15. Receive bytes (BytesRecv): This field records Proxy Server from the client the number of bytes received. The size of the client the number of requests issued to Proxy. Like the previous one field, the field is only used by the Web Proxy. If the field in the Web Proxy log is empty, the client may not send data or do not provide size information.
MIME Type Definition
application / x-msdownload Application
16. Protocol name (Protocol): In the Web Proxy log, the contents of this field is: HTTP, FTP, Gopher, or Secure, according to the customer's agreement to use different. In the Winsock Proxy logs, the field is the number of client connections commonly used protocol (for example: SMTP connection of 110)
17. Transport: between the client and the Proxy Server using the transmission method. Web Proxy connection is always TCP. Winsock Proxy connection is TCP, UDP or IPX / SPX.
18. Operation: Record transfusion Proxy Server implementation of the operation. Web Proxy to record GET, PUT, POST and HEAD. WinSock Proxy to record Connect, Accept, SendTo, RecvFrom and GetHostByName.
image / gif GIF Image
image / jpeg JPG Image
19. Object name (Object Name): This field records the name of the object before the Web Proxy, WinSock Proxy log of the field is empty.
20. Object MIME: Web Proxy to use the field only. Records received by the MIME type of object. If the target server is not defined or not supported, this field will contain the following strings:
MIME Type Definition
application / x-msdownload Application
multipart / x-zip ZIP Archive
image / gif GIF Image
image / jpeg JPG Image
multipart / x-zip ZIP Archive
text / plain ASCII Text File
21. Object Source: Only Web Proxy, where the field comes from the record object. Recorded as follows:
n Field Value Definition
text / plain ASCII Text File
n Unknown Proxy Server could not determine where the object originated.
21. Object Source: Only Web Proxy, where the field comes from the record object. Recorded as follows:
n Cache Object found in cache.
n Field Value Definition
n Rcache Object found on Internet. Objects was added to cache.
n Vcache Object found in cache. Object was verified against target object on Internet.
n NVCache Object found in cache but could not be verified against target object on Internet. Object was still returned to client.
n VFInet Object found on Internet. Object could not be verifed against source.
n PragNoCacheInet Object found on Internet. HTTP header indicates that the object should not be cached.
n Inet Object found on Internet. Object was not added to the cache.
1. Result code (Result code): The field is connected to the Internet site to return the result code on the receipt of the object. The very wide range of field values, Web Proxy and the WinSock Proxy field in the record a different value. In the Web Proxy records where the value of less than 100 representatives of Windows error codes, between 100 and 1000 HTTP status code, the value of more than 10,000 are Wininet or WinSock error code. Web Proxy records of the three most common code is 200 (successful connection), 10060 (connection timeout), 10065 (does not meet the host). In the WinSock Proxy records, the value of this field is one of the following code:
Code Definition

n Unknown Proxy Server could not determine where the object originated.
n Cache Object found in cache.
n Rcache Object found on Internet. Objects was added to cache.
n Vcache Object found in cache. Object was verified against target object on Internet.
n NVCache Object found in cache but could not be verified against target object on Internet. Object was still returned to client.
n VFInet Object found on Internet. Object could not be verifed against source.
n PragNoCacheInet Object found on Internet. HTTP header indicates that the object should not be cached.
n Inet Object found on Internet. Object was not added to the cache.
1. Result code (Result code): The field is connected to the Internet site to return the result code on the receipt of the object. The very wide range of field values, Web Proxy and the WinSock Proxy field in the record a different value. In the Web Proxy records where the value of less than 100 representatives of Windows error codes, between 100 and 1000 HTTP status code, the value of more than 10,000 are Wininet or WinSock error code. Web Proxy records of the three most common code is 200 (successful connection), 10060 (connection timeout), 10065 (does not meet the host). In the WinSock Proxy records, the value of this field is one of the following code:
Code Definition

0 Successful Connection
1 Server Failure
2 Rejection by Proxy due to filtering
3 Network unreachable due to no DNS service available.
4 Host unreachable because no DNS entry could be found for the host.
5 Connection refused by target Internet site.
6 Unsupported client request (perhaps the client is using a non-compliant TCP / IP stack or the WinSock call is from a non-supported version.
7 Unsupported Address type.

0 Successful Connection
1 Server Failure
2 Rejection by Proxy due to filtering
3 Network unreachable due to no DNS service available.
4 Host unreachable because no DNS entry could be found for the host.
5 Connection refused by target Internet site.
6 Unsupported client request (perhaps the client is using a non-compliant TCP / IP stack or the WinSock call is from a non-supported version.
7 Unsupported Address type.

Detailed field and the general field
When you select a general record, some fields will be simple to use "-" to fill, detailed records will be recorded in front of the list of all known data. General log only records the following fields:
Client Computer IP
Client User Name
Authentication Status
Date Logged
Time Logged
Server Name
Destination Name
Destination Port
Protocol Name
Object Name
Detailed field and the general field
Object Source
Result Code

Reading log can sometimes be very confusing, because sometimes seems there is no record of the correct proxy server information. Most importantly, remember to keep the order of fields of Zhengque, and soon you could correctly understand their Le.



When you select a general record, some fields will be simple to use "-" to fill, detailed records will be recorded in front of the list of all known data. General log only records the following fields:
Client Computer IP

Client User Name
Authentication Status
Date Logged
Time Logged
Server Name
Destination Name
Destination Port
Protocol Name
Object Name
Object Source
Result Code

Reading log can sometimes be very confusing, because sometimes seems there is no record of the correct proxy server information. Most importantly, remember to keep the field in the correct order, and soon you will be able to correctly understand them anymore.








相关链接:



Daniusoft AAC Music Converter



Youtube FLV to Printers Platinum



Infomation Audio Players



ITunes Converter



mp4 Converter free download



Bluesea DVD to WMV



Audio file converter



Blue Cat''s Remote Control



video format for PS3



Mov to avi converter free



Youtube FLV to FLV Guide



Wizard Benchmarking



Yaease Flash To Video Studio



Top Compilers And Interpreters



Friday, July 2, 2010

Bluesea SVCD DVD Cloner

Bluesea DVD Clone is a most popular powerful dvd movie clone software. It produces perfect copies every time, and does it quickly and efficiently. Video quality of copied discs is perfect, since there's no recompression or altering of the VOB files from the original disc. Bluesea DVD Clone was designed to backup your precious DVD without any quality loss. backup you DVDs in 20 mins. Bluesea DVD Clone comes complete with numerous customizable video/audio controls that can deliver the highest quality viewing and listening experience.



Bluesea DVD Clone is Burn DVD Video Disc: you can duplicate the DVD or DVD disc which kept in DVD content folder to DVD disc,so that you can watch the DVD from a home DVD player. Duplicate DVD disc from a DVD disc directly, real 1:1 perfectly clone dvd. Copy DVD to the harddisk, so that you can edit or play the dvd from HDD, and burn it to the DVD disc later as a DVD video disc. Bluesea DVD Clone offers feature-rich navigation controls, for a more interactive and tailored DVD experience. Bluesea DVD Clone is guaranteed to deliver the highest quality and personalized DVD Copy experience possible on the PC today!



Recommand Link:



My FAVORITE Web Servers



Youtube Movie to PDA Popular



Youtube to ASX Pack



Youtube FLV to Treo Live



real player to h.264/avc



Convert dvd to divx



HD to ZEN X-FI2 software



Swift DVD to AVI



ContextConvert Pro



Review System Maintenance



aac to mp3 Converter



Hope iPod SWF Encode



Storage Cartoons - Screen Savers