web proxy log analysis
Most Relevant Content
MikroTik WebProxy Log Analyzer Configuration
MikroTik RouterOS generally logs various system events and status information. Logs are mainly saved in router’s memory (RAM) or disk. MikroTik logs can also be sent by email or even can be sent to a remote syslog server. All logs those are saved in router’s local memory can be viewed from Log menu. Any log entry that is saved in local memory contains time and date when event occurred, topics that this message belongs to and message itself. But local log information is not enough for analyzing user’s activity completely. So, if you wish to view user activity elaborately, you must use any remote syslog server. In this article, I will configure a remote syslog server named WebProxy Log Analyzer which will help to get user activity more elaborately. WebProxy Log Analyzer Configuration WebProxy Log Analyzer is a windows based syslog server. So, installation and configuration are hassle free and so easy. There are two end configuration for configuring a WebProxy Log Analyzer server. MikroTik End Configuration for sending log information to WebProxy Syslog Server. Webproxy Log Analyzer configuration in windows operating system. MikroTik Configuration for Sending Log Information MikroTik Router basic configuration and transparent web proxy configuration are prerequisites [...]
- »
NGINX and PHP-FPM: A High-Performance Web Hosting Duo | September 26, 2024
When it comes to hosting high-performance websites or web applications, Nginx and PHP-FPM are often paired together due to their complementary capabilities. NGINX is a highly efficient web server which works seamlessly with PHP-FPM. PHP-FPM is a FastCGI Process Manager for PHP that is used to deliver fast, reliable, and scalable solutions for dynamic content. What is Nginx? Nginx (pronounced as “engine-ex”) is a lightweight, high-performance web server that is widely used for serving static content, load balancing and reverse [...]
- »
CentOS 7.5 Installation Step by Step with GUI (GNOME Desktop) | August 15, 2018
Linux is a free and open source operating system developed by Linus Torvalds on September 17, 1991. It is mainly used as server environment. A lot of Linux distributions are present today. Among them, Red Hat Linux is used as enterprise Linux. Red Hat is also known as Red Hat commercial Linux that means Red Hat is a paid service program. CentOS (Community Enterprise Operating System) is another Linux distribution that provides a free and open source, enterprise-class, community-supported server platform functionally compatible with [...]
- »
MikroTik OpenVPN Setup with Windows Client | April 2, 2018
VPN (Virtual Private Network) technology provides a secure and encrypted tunnel across a public network. So, a private network user can send and receive data to any remote private network through VPN tunnel as if his/her network device was directly connected to that private network. MikroTik OpenVPN Server provides a secure and encrypted tunnel across public network for transporting IP traffic using PPP. OpenVPN uses SSL Certificates. So, OpenVPN Tunnel is a trusted tunnel to send and receive data across [...]
- »
How to Create Gmail Account Successfully | August 17, 2015
Email is the heart of any business communication today. Not only enterprise companies but also our personal life’s activities are mostly depended on email. So, every person should have an email account today. There are many online companies (such as Gmail, Yahoo and Hotmail) who are providing free email services for any online users. Among these online companies, Gmail is the most popular free email service by Google with 15 GB free storage facility. Gmail has huge features to maintain [...]
- »
MikroTik IPIP Tunnel with IPsec (Site to Site VPN) | March 18, 2018
VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides IPIP tunnel that is used to create a site to site VPN. IPIP tunnel is a simple protocol that encapsulates IP packets in IP to make a tunnel between two routers. To encapsulate [...]
- »
MikroTik Load Balancing and Link Redundancy with PBR | March 31, 2019
In computer networking, the Load Balancing technique is used to send network traffic over multiple gateways. If you have multiple ISP connections available, you can use load balancing technique to establish a stable network. You may now ask, why will I use multiple ISP connections? What are the benefits to use multiple ISP connections in my network? For your satisfaction, the following points are some reasons to use load balancing technique in your network. No ISP can give you 100% [...]
- »
Managing Disk Partition with the parted Tool in CentOS 7 | March 2, 2019
As a system administrator, sometimes you may require to manage partitions of your CentOS/Red Hat Linux Operating System. Partition management is always a risky task. But there are some useful tools those are so helpful to manage CentOS/Red Hat Linux disk partition easily. In my previous article, I discussed how to manage CentOS/Red Hat 7 HDD partitions with the fdisk utility. The fdisk tool is only eligible to manage MBR partition table. But GPT partition table is now becoming more [...]
- »
Create System Restore Point in Windows OS | August 27, 2015
System Restore utility in windows operating system helps a windows user to take one or more snapshots of his/her windows system when windows operating system is working well. If any system crash occurs in future due to virus attack or critical system update or any unwanted program, the system can be reverted to its previous snapshot when windows OS was working well. So, System Restore utility in windows operating system is a very helpful service for windows users to protect [...]
- »
User Management in Linux (Red Hat/CentOS) | September 28, 2017
User management is an important part of Linux (especially Red Hat Enterprise Linux) system administration. Linux users can be administrated using user or group administration GUI (Graphical User Interface) tool as well as through Red Hat/CentOS Linux command prompt. But I will always suggest you to do command line user administration as much as possible because in production GUI will not be provided always. Many people who are learning Linux administration do not know all features of user administration command [...]
More Similar Content
You May Also Like