On Wed, 2 Aug 2000, Jeff Newton wrote:
> I would like some recommendations on log analysis or forensics
> methods. Obviously log collection isn't enough without some form of
> analysis after the fact.
I have something that can do real time analysis. Check out
http://www.enteract.com/~lspitz/intrusion.html
hope that helps :)
lance
================================================================================
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
================================================================================