Maintaining system performance and guaranteeing security depend on good log management. Centralizing, sorting, and analyzing log data from many devices and applications across a network greatly ...
In a column about syslog [see “syslog Configuration” in the December 2001 issue of LJ] I mentioned “stealth logging”--by running your central log server without an IP address, you can hide your ...
I’m attending a fantastic session at LinuxWorld today titled “Working with Log Files.” The session is being run by Mark Cohen (Quote.com, LookSmart, Penquin Computing) and Patrick McGovern ...