I’m attending a fantastic session at LinuxWorld today titled “Working with Log Files.” The session is being run by Mark Cohen (Quote.com, LookSmart, Penquin Computing) and Patrick McGovern ...
Use the documentation. Man syslogd(8). Specifically you want the '-r' option. You'll probably need to modify your init scripts to get it to take, or they may be a configfile in /etc/defaults or ...
You should try using a Syslog server instead to capture router logs... But if you need to use SMTP, then any of them can be setup not to require auth, just don't select that option.. You will need to ...
Lance Spitzner of the Honeynet Project (www.honeynet.org) suggests a trick that's useful for honey (decoy) nets and maybe even for production DMZs: stealth logging. This trick allows a host connected ...
One dæmon you probably won't need to reconfigure but still should be aware of is klogd, Linux's kernel log dæmon. This dæmon is started automatically at boot time by the same script that starts the ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results