Can anyone suggest any books or preferably online briefings that give an
idea of what logs should be monitored in the Windows 2K environment as well
as Linux, as well as how to interpret them, what to look for, what each
lines mean, etc.  I think this is a great way to start a forray into
understanding system security or at least O/S hardening.  Thanks kindly.




_________________________________________________________
Do You Yahoo!?
Get your free @yahoo.com address at http://mail.yahoo.com

Reply via email to