An authentication and validation mechanism for analyzing syslogs forensically
ACM SIGOPS Operating Systems Review
Hi-index | 0.01 |
In this article we are going to cover the idea of logging the system activities over a TCP network in a secure way,interfacing the existing syslog daemon with secure shell using simple Perl scripts.