Can anyone suggest any books or preferably online briefings that give an idea of what logs should be monitored in the Windows 2K environment as well as Linux, as well as how to interpret them, what to look for, what each lines mean, etc. I think this is a great way to start a forray into understanding system security or at least O/S hardening. Thanks kindly.
_________________________________________________________ Do You Yahoo!? Get your free @yahoo.com address at http://mail.yahoo.com