Hi, it is a good security feature to log in a remote host, because an attacker should have access to that host to delete the logs, and this adds another security layer to the architecture you build.
Linux logging facilities are managed mostly by the syslog Daemon. Syslog uses the configuration file /etc/syslog.conf to know where to log every system message.
(more...)
lunes, 16 de junio de 2008
Suscribirse a:
Comentarios de la entrada (Atom)

No hay comentarios.:
Publicar un comentario