Ubuntu is a popular linux distribution and this article explains how logs are generated, where they are stored, and what they capture.
Some logs require immediate response to prevent a breach or to recover a broken system. Today's critical logs are the PHP fatal errors.
Microsoft Office365 (Azure-based) offers a very powerful audit trail of Exchange email logs. In this guide, we will explain how they look like and what to take from them.
NGINX is a powerful web server and logging is a critical piece to managing a web server. In this article we explain the two log types: access and error, and how to work with them.
HTTP User agents are a big part of how browsers and web servers communicate. In this article, we cover what they are and the most common user agents.
NGINX is the most popular web server in the planet and in this post, we will analyse their error logging in detail.
Understanding the logs from Dropbear, a SSH server meant for low memory systems. Useful to understand the logs from your routers, including OpenWrt, Ubiquiti, Unifi, etc.
In this article we explain the two log types: access and error, and how to work with them.