Proxy logs need a bit of work done to them before you can start analysing the content. This is of course assuming you don't have a fancy product to do all this work for you ;). First, you need to work out the regular expression that defines a line in the proxy log to parse it into a nicer format such as CSV. A lot of the CSV columns can probably be removed; the most useful columns are URL, date & time, user agent string (to work out what browser the user was using for example) and request status code (to work out if the user was able to access the content or if it was blocked, unavailable etc).
counting tea Strathclyde laptop QR codes Women in Technology Derren Brown O2 Gullane Moroccan cuisine privacy exams file headers Pixel search terms tags Nybble rabbit vision Post Secret readability induction ACPO England restaurant sophisticated cyber attack Google section breaks rock sewing reference management Mweke birthday paradox abandoned buildings Art Attack 30 Seconds to Mars unicode mobile phones usability law timestamps foamcore Geocities moving flat RIPA GPU wifi General Election foodies magnets web usability Fort William paintings board games steganography cheatsheet résumé thumbs.db sausages art gallery criminology