Feed on
Posts
Comments

Monthly Archive for September, 2010

Log files are mainly used for investigative reasons but there is a secondary usage of logging and that is performance analysis. Just recently I helped a hospitals surgery to pinpoint where they could be more effective by importing the log files into an analysis tool, using user identity to identify who did what and then […]

Read Full Post »

One of the most often forgotten mechanisms of all kinds of security practice is tools used for investigation, log files and forensics. It is all good and well to have mechanisms that deter, detect and takes action but if something happens will you know what happened and, more important, who was the one who did […]

Read Full Post »