Reg=[]
Reg.append([1,2,3])
Reg.append([4,5,6])
Reg.append('abc')
Reg2=[1,2,3]

def testf():
	print 12

import datetime
import string

starttime = datetime.datetime.today()-datetime.timedelta(2);
#starttime = starttime.strftime('%Y-%m-%d')
starttime = datetime.datetime(2000,10,01,10,10,10,100)
#print str(starttime)
#str='ab'
#print 'Microsoft Office Word opened at '+str(starttime)+' and closed at '+str(starttime)

def exist(s1, s2):
	return s1.find(s2) != -1
s1='ab cd';	s2='b c'
#print exist(s1,s2)

def findType(s):
	s2 = 'Microsoft Office '
	idx = s.find(s2)
	if(idx==-1):	return ''
	else:
		idx += len(s2)
		result=''
		while(s[idx]!=','):
			result += s[idx]
			idx += 1
		return result
	
str='ID: 0, Application Name: Microsoft Office Word, Application Version: 12.0.6211.1000, Microsoft Office Version: 12.0.6215.1000. This session lasted 16 seconds with 0 seconds of active time. This session ended normally. '
delta = findType(str)

dic={ 'a':1, 'b':[1,2,3], 
		12:'abc', (1,2):3 }
dic[1]=2
li={'abcd',2,3,4}
#print len(li)

li = [1,2,3,4]
li2=[5,6,7]
dic = { 1:li2 }
li2=[]
l=[1,2]
l.append([1,2])

def func(a):
	a.a=1
class A:
	a=2
a=A()
func(a)

l=[]
l.append(a);	l.append(a)


class Session:
	def __init__(self):
		print 1
	def __init__(self, Name, StartTime, EndTime):
		name=Name;	startTime = StartTime;	endTime = EndTime
	name=''
	startTime='' #type: datetime
	endTime=''
	fileList=[]
	type='SESSION' #type=='SESSION' if fileList is not empty, and =='FILE' while empty
	
aa=Session('name','time1','time2')
ll=[]
ll.append(aa)
for tmp in ll:
	print tmp.type

st = '''An account was successfully logged on. Subject: Security ID
: S-1-5-18 Account Name: WZY-PC$ Account Domain: WORKGROUP Logon ID: 0x3e7 Logon
 Type: 5 New Logon: Security ID: S-1-5-21-3038169112-1607623498-1536977453-1000
Account Name: wzy Account Domain: wzy-PC Logon ID: 0xcbd044 Logon GUID: {0000000
0-0000-0000-0000-000000000000} Process Information: Process ID: 0x220 Process Na
me: C:\\Windows\\System32\\services.exe Network Information: Workstation Name: W
ZY-PC Source Network Address: - Source Port: - Detailed Authentication Informati
on: Logon Process: Advapi Authentication Package: Negotiate Transited Services:
- Package Name (NTLM only): - Key Length: 0 This event is generated when a logon
 session is created. It is generated on the computer that was accessed. The subj
ect fields indicate the account on the local system which requested the logon. T
his is most commonly a service such as the Server service, or a local process su
ch as Winlogon.exe or Services.exe. The logon type field indicates the kind of l
ogon that occurred. The most common types are 2 (interactive) and 3 (network). T
he New Logon fields indicate the account for whom the new logon was created, i.e
. the account that was logged on. The network fields indicate where a remote log
on request originated. Workstation name is not always available and may be left
blank in some cases. The authentication information fields provide detailed info
rmation about this specific logon request. - Logon GUID is a unique identifier t
hat can be used to correlate this event with a KDC event. - Transited services i
ndicate which intermediate services have participated in this logon request. - P
ackage name indicates which sub-protocol was used among the NTLM protocols. - Ke
y length indicates the length of the generated session key. This will be 0 if no
 session key was requested. '''
print st.find('C:\\Windows\\System32\\winlogon.exe')









