log – POFTUT

Tagged: log

What Is Apache Kafka, Use Cases, Advantages and How To Install and Use Apache Kafka? 0

What Is Apache Kafka, Use Cases, Advantages and How To Install and Use Apache Kafka?

Apache Kafka is a distributed streaming platform. Let’s explain it in more details. Apache Kafka is three key capabilities where publish and subscribe to streams of records, similar to a message queue or enterprise messaging system. Apache Kafka provides a distributed publish-subscribe messaging system and robust queue that can handle...


NTP Port Number and Configuration Tutorial For Linux Local System

NTP is a core protocol used today’s IT infrastructure to synchronize date and time information. In order to work properly, we need to configuration NTP port in our server, client and intermediate systems like switch, firewall, router. NTP Port UDP 123 NTP uses the UDP port number 123 by default. NTP...


What is Syslog Default Port and Secure Port and How to Configure It?

syslog is a standardized protocol used to send Logs and events to the Log server. syslog can be used in different platforms like Linux, Windows, Unix, Applications etc. In this tutorial we will look the default syslog port and secure syslog port and some examples about how to change this port number....


What Is Nagios?

Nagios is an open source system, network, application monitoring system. Nagios is designed to be run on Linux operating system or distributions like Ubuntu, Debian, CentOS etc. Architecture and Components Nagios is not a single component to run. Nagios is actually a suite which provides following components. Nagios IX Nagios...


How To Use Linux dmesg Command To Print System Logs?

dmesg is used to print and control kernel ring buffer. This explanation may be confusing for the most of the readers. Here simplified explanation. dmesg provides logs for troubleshoot, diagnose or save which is created by Linux kernel. It provides low level messages which is not logged by other subsystems....


Windows Robocopy Command Tutorial with Examples To Copy Files In Safe Way

Robocopy or Robust File and Folder Copy application is very popular amongst in Windows system administrators. Robocopy will copy the local or given file to the remote or destination location. Syntax The general syntax of robocopy command is like below. SOURCE is the source file or directory we want to copy...


Git – Reviewing Changes

Git stores all commits as snapshots. We can commit limitless. If we can to review our commits we can use log command. Git Log We can simple list commits without any argument tot the log command.

As we see there are 3 commits for the whole history of the Git repository....


How To Manage Windows Firewall From Command Line With Netsh Command?

Windows firewall is a useful mechanism which is used to control network traffic and ports. There are different ways to manage Windows firewall like GUI, Powershell and MS-DOS. Today we will look in detail how to manage windows firewall from command line with a popular tool named netsh . Netsh is...


How To Use Psexec Tools To Run Commands and Get Shell Remote Windows Systems?

Windows operating system provides different ways to manage remote systems. Telnet, RDP, VNC are some of them. But these options are generally bound to a graphical user interface. If we prefer command line interface there is an alternative named Psexec. Psexec is actually a toolset consisting of following tools. PSexec used...

Enjoy this blog? Please spread the word :)