How to Configuring Local Logging on Solaris 8 and Use Symantec Intruder Alert for Centralized Logging
Logging is often a forgotten security friend for system administrators until a security breach has occurred. The security administrator then goes to look at the logs only to find that there are no logs, the logs are incomplete, or that the logs have been modified by the attacker himself to cover...