16 Jan
2002
16 Jan
'02
15:36
Another solution is not to log portscans and other types of high volume log traffic. Ask yourself this, do you actually read those log files or otherise do something with them? If the answer is not an immediate "YES!" then you may not need to enable some forms of logging. Kurt Seifried, kurt@seifried.org A15B BEE5 B391 B9AD B0EF AEB0 AD63 0B4E AD56 E574 http://www.seifried.org/security/