Monitoring system logs using the Logcheck
DOI:
https://doi.org/2080-9069Keywords:
man-in-the-middle, dnsspoof, 802.11, wireless networkAbstract
The article describes an attack mitm /man-in-the-middle/ along with redirecting DNS traffic on the selected machine. Discuss the process allows you to trace the path of the attacker. Network administrators will be able to carefully look at the problem in relation to their own network resources.Published
2014-06-30
How to Cite
WOŁOSZYN, J. (2014). Monitoring system logs using the Logcheck. Journal of Education, Technology and Computer Science, (2), 419–424. https://doi.org/2080-9069
Issue
Section
SELECTED PROBLEMS OF SCHOOL EDUCATION