Solved

User Tracking ? AWSTATS / Google Analytics

Posted on 2006-10-25
16
1,326 Views
Last Modified: 2008-02-01
I have a site where my host provides AWSTATS to track hit's view's etc...

On this site, I have users who logon to my site which uses PHP and a MySQL DB to store the user logon's and passwords.

But AWSTATS isn't picking up on these users as authenticated users.  Is there a line of code or something I need to use to track users?

I also have Google Analytics installed on this site, and it doesn't seem to have an option for tracking individual users.  Is there a way to do this?

What I am trying to accomplish is tracking of users; pages viewed, number of visits, and their IP addresses.  What is the best way to go about this?

Thanks,
-BassKozz
0
Comment
Question by:basskozz
  • 8
  • 5
  • 3
16 Comments
 
LVL 16

Accepted Solution

by:
OliWarner earned 250 total points
ID: 17808317
Forms authentication (what you're using) doesnt show as a real user for AWStats. You need to use basic authentication to get that to work, and in my opinion, its not worth it. You would be better off making your own stats logger in PHP if you need to track individual people around.

>> I also have Google Analytics installed on this site, and it doesn't seem to have an option for tracking individual users.  Is there a way to do this?

No it only tracks trends.

As I said, if you want full user tracking, implement your own system that can feed off the session variables. Neither Analytics or AWStats will be able to help you here.

0
 

Author Comment

by:basskozz
ID: 17808361
Are there any sourceforge or commercial products availavle that I could impliment for this?
Thanks,
-BassKozz
0
 
LVL 16

Expert Comment

by:OliWarner
ID: 17808385
I daresay there are lots that you could adapt but you have to remember that there is nothing that will do this for you "off the shelf" because your user is going to be stored in a session variable that you made.

If the system isn't homemade then you might be able to find something out there for whatever its using.
0
 
LVL 17

Expert Comment

by:CSecurity
ID: 17808489
Awstat have some bugs in alot of version that lead to big problems... hackers can own your server with bugs in awstat!

I suggest you to use google analytics Urchin 5... Easy, secury and reliable... ;)
0
 

Author Comment

by:basskozz
ID: 17808503
OliWarner,
Where can I get info on session variables and how to use them to track users?
0
 
LVL 17

Expert Comment

by:CSecurity
ID: 17808509
Which programming language you use and what operating system your server runs?
0
 
LVL 17

Assisted Solution

by:CSecurity
CSecurity earned 250 total points
ID: 17808514
0
 
LVL 17

Assisted Solution

by:CSecurity
CSecurity earned 250 total points
ID: 17808515
0
Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

 
LVL 17

Assisted Solution

by:CSecurity
CSecurity earned 250 total points
ID: 17808519
0
 

Author Comment

by:basskozz
ID: 17808524
PHP 5
Apache I think, er Linux
0
 
LVL 16

Expert Comment

by:OliWarner
ID: 17808526
A session var is just a variable that is tied to one user (usually by a cookie). When you use forms authentication, session variables are made to store the username and other login information so the system knows who the user is.

If you have to ask, I'm assuming you didn't make the login system yourself. If that's the case, tell us what system it is and I'll look to see if i can find any tracking systems for that system.

>> I suggest you to use google analytics
That only works for pages with the script in and only works on browsers with javascript enabled. Server Side stat analysis is the only way to monitor all traffic.
0
 
LVL 17

Expert Comment

by:CSecurity
ID: 17808543
Nowadays most of browsers have javascript enabled... Browser without javascript is not useful!

Server side analysis maybe good... But not Awstat! Too buggy! (in security stuff)
0
 
LVL 17

Expert Comment

by:CSecurity
ID: 17808555
<Link removed by CetusMOD>

A lot of code execution bugs!
0
 
LVL 16

Expert Comment

by:OliWarner
ID: 17808562
It depends how you run it.

 - If it is secured (with authentication) then people cannot access it to exploit it.
 - If you run it on batch mode from crontab (as I do) there are only static html files accessable and people cannot exploit these.
0
 
LVL 16

Expert Comment

by:OliWarner
ID: 17808581
CSecurity a few things:
a) Don't link to exploit sites. I'm pretty sure that's against the EEMA.
b) All those exploits are preventable just by using a little common sense. How many people do you think leave their stats open for anyone to view anyway?
c) If you have more to say, use the return button to make a new line rather than using a new post for everything you say. My inbox is starting to bleed from all the email activity in this thread.
0
 
LVL 17

Expert Comment

by:CSecurity
ID: 17808594
Thanks alot for teaching me return button... I never was aware of it... Hurrraaaay! I learned return button! Yes! It is exactly on my keyboard... Middle of it! Thanks for your help...

I don't know what is EEMA and don't like to know... ;)

Exploits are preventable... But you cannot guess how many hackers are over the world who do not publish bugs that they discover! You can just apply patches that Awstat's vendor publish and they publish patch for revealed bugs... Do not forget it... ;)

No problem bro... Go ahead with Awstat... Just let me know server's address then you installed Awstat on it :))))))

Take care ;)
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Suggested Solutions

Accessibility and Usability are two concepts that seem to be closely related.  But, too many people seem to have a distorted perception of them. During last five years, those two words have come to the day-to-day work of almost every web develope…
Foreword (July, 2015) Since I first wrote this article, years ago, a great many more people have begun using the internet.  They are coming online from every part of the globe, learning, reading, shopping and spending money at an ever-increasing ra…
Explain concepts important to validation of email addresses with regular expressions. Applies to most languages/tools that uses regular expressions. Consider email address RFCs: Look at HTML5 form input element (with type=email) regex pattern: T…
This tutorial demonstrates how to identify and create boundary or building outlines in Google Maps. In this example, I outline the boundaries of an enclosed skatepark within a community park.  Login to your Google Account, then  Google for "Google M…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now