Beefy Boxes and Bandwidth Generously Provided by pair Networks
Do you know where your variables are?

Re: Defensive Programming and Audit Trails

by mattr (Curate)
on Aug 07, 2002 at 08:05 UTC ( #188252=note: print w/ replies, xml ) Need Help??

in reply to Defensive Programming and Audit Trails

Agreed, log files are great.

Another use I have found recently is using a log file to figure out what is going on in a child, during development. I had some legacy code and this child was sending email, it was being ported to windows.. well it was very useful.

Sometimes I use shell output redirection so I get stderr and stdout both going to the same file, to log what happened with a system call. I don't want to post the wrong info but it is something like &2>1, see man bash.

Comment on Re: Defensive Programming and Audit Trails

Log In?

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://188252]
and the web crawler heard nothing...

How do I use this? | Other CB clients
Other Users?
Others wandering the Monastery: (3)
As of 2015-11-28 00:27 GMT
Find Nodes?
    Voting Booth?

    What would be the most significant thing to happen if a rope (or wire) tied the Earth and the Moon together?

    Results (735 votes), past polls