Daily tasks of every security or network administrator involve reviewing the content of log files for suspicious entries indicating that a potential attack has occurred, or is in the process of occurring. Working with logs is a very time consuming and cumbersome task. Several servers generate log...