On Wed, 2 Aug 2000, Jeff Newton wrote:

> I would like some recommendations on log analysis or forensics 
> methods.  Obviously log collection isn't enough without some form of
> analysis after the fact.

I have something that can do real time analysis.  Check out
http://www.enteract.com/~lspitz/intrusion.html

hope that helps :)

lance



================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to