Functions of controlling file access are usually delegated to specialized systems intended for protecting network information from unauthorized access, such as Secret Net. However, in some cases, such systems can not be used for controlling access to files containing critically important information (for example, database files or password files). This relates to the fact that most such systems can not run under Unix clones, particularly, Solaris, Linux, HP UX, and AIX. Such systems are ideal for securing Windows, and sometimes, NetWare platforms. However, they are practically useless when it is necessary to protect Unix. In this case, the best thing to do is to use host-based intrusion detection systems. In this situation, it is possible to use both intrusion detection systems based on log-file analysis (for example, RealSecure Server Sensor) and IDSs analyzing system calls (such as Cisco IDS Host Sensor).