This chapter is devoted to monitoring. A major part of this is automatically monitoring log files. You also look at LAN traffic, monitoring the scanners that crackers use to scan your system, and monitoring processes. There is a brief discussion about the use of Caller ID, used to see who is dialing into your modems. You also consider the use of cron to automatically perform monitoring duties and also see how it can be turned against you by crackers. The topics covered in this chapter include:
|
Top |