Know Your Enemy: II

Have you read the latest issue of our digital (IN)SECURE Magazine? If not, do it now.

How to determine what the enemy is doing by analyzing your system log files. Includes examples based on two commonly used scanning tools, sscan and nmap.

Read the paper in HTML format here.