disguise of an subsequent attack, which would otherwise be logged. For the unstable distribution (sid), this problem has been fixed in version 2.0.6-1. For the stable distribution (etch), this problem ...
Whatever else you do to secure a Linux system, it must have comprehensive, accurate and carefully watched logs. Logs serve several purposes. First, they help us troubleshoot virtually all kinds of ...