log – POFTUT

What Is Apache Kafka, Use Cases, Advantages and How To Install and Use Apache Kafka?

What Is Apache Kafka, Use Cases, Advantages and How To Install and Use Apache Kafka?

Apache Kafka is a distributed streaming platform. Let’s explain it in more detail. Apache Kafka is three key capabilities where publish and subscribe to streams of records, similar to a message queue or enterprise messaging system. Apache Kafka provides a distributed publish-subscribe messaging system and robust queue that can handle a high volume of data … Read more

NTP Port Number and Configuration Tutorial For Linux Local System

NTP is a core protocol used today’s IT infrastructure to synchronize date and time information. In order to work properly, we need to configuration NTP port in our server, client and intermediate systems like switch, firewall, router. NTP Port UDP 123 NTP uses the UDP port number 123 by default. NTP services run on UDP protocol … Read more

What is Syslog Default Port and Secure Port and How to Configure It?

syslog is a standardized protocol used to send Logs and events to the Log server. syslog can be used in different platforms like Linux, Windows, Unix, Applications etc. In this tutorial we will look the default syslog port and secure syslog port and some examples about how to change this port number. Default Port Number UDP 514 … Read more

What Is Nagios?

What Is Nagios?

Nagios is an open-source system, network, application monitoring system. Nagios is designed to be run on the Linux operating system or distributions like Ubuntu, Debian, CentOS, etc. Architecture and Components Nagios is not a single component to run. Nagios is actually a suite which provides following components. Nagios IX Nagios IX is the core of … Read more

How To Use Linux dmesg Command To Print System Logs?

dmesg is used to print and control kernel ring buffer. This explanation may be confusing for the most of the readers. Here simplified explanation. dmesg provides logs for troubleshoot, diagnose or save which is created by Linux kernel. It provides low level messages which is not logged by other subsystems. Provided Information Type dmesg command … Read more

Understanding and Configuring Apache Access Log

Understanding and Configuring Apache Access Log

Web server logs provide a lot of information about the web application and user. Apache is a very popular web server used by millions of web sites. Apache provides different types of logs like access , error etc. In this tutorial, we will look at how Apache Access Log configured and try to understand log format. … Read more

Windows Robocopy Command Tutorial with Examples To Copy Files In Safe Way

Robocopy or Robust File and Folder Copy application is very popular amongst Windows system administrators. Robocopy will copy the local or given file to the remote or destination location. robocopy Features The command robocopy provides very useful features for files copying over network. Below we will list some of them. Resume Interrupted Copy when the … Read more

Git – Reviewing Changes

Git stores all commits as snapshots. We can commit limitless. If we can to review our commits we can use log command. Git Log We can simple list commits without any argument tot the log command. $ git log commit 877ab08a2c122c70326bb025530e48cb673c8505 Author: John Doe <jdoe@poftut.com> Date:   Sat Oct 8 04:23:46 2016 +0000    Version 4,Added LICENSE commit 22dc9ad592d5bc21412a246791a05abd42e72793 … Read more

How To Manage Windows Firewall From Command Line With Netsh Command?

Windows firewall is a useful mechanism which is used to control network traffic and ports. There are different ways to manage Windows firewall like GUI, Powershell and MS-DOS. Today we will look in detail how to manage windows firewall from command line with a popular tool named netsh . Netsh is a built-in tool which exists … Read more

How To Use Psexec Tools To Run Commands and Get Shell Remote Windows Systems?

Windows operating system provides different ways to manage remote systems. Telnet, RDP, VNC are some of them. But these options are generally bound to a graphical user interface. If we prefer a command-line interface there is an alternative named Psexec. Psexec is actually a toolset consisting of following tools. PSexec used to execute commands at remote … Read more