Monitoring system logs using the Logcheck

Authors

  • Jacek WOŁOSZYN

DOI:

https://doi.org/2080-9069

Keywords:

man-in-the-middle, dnsspoof, 802.11, wireless network

Abstract

The article describes an attack mitm /man-in-the-middle/ along with redirecting DNS traffic on the selected machine. Discuss the process allows you to trace the path of the attacker. Network administrators will be able to carefully look at the problem in relation to their own network resources.

Published

2014-06-30

How to Cite

WOŁOSZYN, J. (2014). Monitoring system logs using the Logcheck. Journal of Education, Technology and Computer Science, (2), 419–424. https://doi.org/2080-9069

Issue

Section

SELECTED PROBLEMS OF SCHOOL EDUCATION