Whatever else you do to secure a Linux system, it must have comprehensive, accurate and carefully watched logs. Logs serve several purposes. First, they help us troubleshoot virtually all kinds of ...
An important part of any project, logging can be used as a debugging tool during development, and a troubleshooting tool once a system has been deployed in a production environment. Because most ...
Writing some messages to multiple locations is a pretty normal thing in all UNIX / Linux syslog configurations, so I would just leave it alone. You're not going to gain much of anything for all the ...
I’m attending a fantastic session at LinuxWorld today titled “Working with Log Files.” The session is being run by Mark Cohen (Quote.com, LookSmart, Penquin Computing) and Patrick McGovern ...
Lance Spitzner of the Honeynet Project (www.honeynet.org) suggests a trick that's useful for honey (decoy) nets and maybe even for production DMZs: stealth logging. This trick allows a host connected ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results