Linux Standard Base, 28-29
LSB-compliant startup scripts, 43
security implications, 136-137
logfiles, 268-270
centralized logging, 269
checking for intrusion attempts, 9
configuring the syslog daemon, 271-274
creating logfile policies, 270
finding, 285
hyphens in front of logfile names , 274
managing, 284-285
other system logfiles, 285-286
searching, 286-287
searching manually, 287-288
searching with logsurfer, 289-290
searching with logwatch, 288-289
searching with swatch, 291-293
setting up centralized servers, 275-285
syncing, 274
LSB, 28-29
-compliant startup scripts, 42
security implications, 136-137