How to Configuring Local Logging on Solaris 8 and Use Symantec Intruder Alert for Centralized Logging

Logging is often a forgotten security friend for system administrators until a security breach has occurred. The security administrator then goes to look at the logs only to find that there are no logs, the logs are incomplete, or that the logs have been modified by the attacker himself to cover...
Nolan Haisler
May 5, 2005

All papers are copyrighted. No re-posting of papers is permitted