Maintaining system performance and guaranteeing security depend on good log management. Centralizing, sorting, and analyzing log data from many devices and applications across a network greatly ...
In a column about syslog [see “syslog Configuration” in the December 2001 issue of LJ] I mentioned “stealth logging”--by running your central log server without an IP address, you can hide your ...
I’m attending a fantastic session at LinuxWorld today titled “Working with Log Files.” The session is being run by Mark Cohen (Quote.com, LookSmart, Penquin Computing) and Patrick McGovern ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results