Monitoring system logs using the Logcheck

Authors

  • Jacek WOŁOSZYN Uniwersytet Technologiczno-Humanistyczny w Radomiu, Polska

Keywords:

man-in-the-middle, dnsspoof, 802.11, wireless network

Abstract

The article describes an attack mitm /man-in-the-middle/ along with redirecting DNS traffic on the selected machine. Discuss the process allows you to trace the path of the attacker. Network administrators will be able to carefully look at the problem in relation to their own network resources.

Published

2014-12-30

How to Cite

WOŁOSZYN, J. (2014). Monitoring system logs using the Logcheck. Journal of Education, Technology and Computer Science, 10(2), 419–424. Retrieved from https://journals.ur.edu.pl/jetacomps/article/view/6627

Issue

Section

ICT IN EDUCATIONAL RESEARCH