An important part of any project, logging can be used as a debugging tool during development, and a troubleshooting tool once a system has been deployed in a production environment. Because most ...
In a column about syslog [see “syslog Configuration” in the December 2001 issue of LJ] I mentioned “stealth logging”--by running your central log server without an IP address, you can hide your ...
TechRadar Pro created this content as part of a paid partnership with Paessler. The content of this article is entirely independent and solely reflects the editorial ...
Writing some messages to multiple locations is a pretty normal thing in all UNIX / Linux syslog configurations, so I would just leave it alone. You're not going to gain much of anything for all the ...
Lance Spitzner of the Honeynet Project (www.honeynet.org) suggests a trick that's useful for honey (decoy) nets and maybe even for production DMZs: stealth logging. This trick allows a host connected ...
I haven't posted for a while, but I have a new dilemma and I would appreciate your thoughts. We are currently using Kiwi Syslog (paid version) to log our syslog messages for network infrastructure ...