Link Details

Link 1017187 thumbnail
User 427814 avatar

By jeffreyw
via blog.logentries.com
Submitted: Aug 19 2013 / 10:10

When using an agent-based program for setting up your log management, security can sometimes be a concern. Should an account be compromised, the agent could possibly be used to monitor more than it was supposed to. Find out a simple way to prevent this kind of security breach. How are you protecting your logs?
  • 5
  • 0
  • 187
  • 23

Add your comment


Html tags not supported. Reply is editable for 5 minutes. Use [code lang="java|ruby|sql|css|xml"][/code] to post code snippets.

Voters For This Link (5)



Voters Against This Link (0)



    Debugging JavaScript
    Written by: Ashutosh Sharma
    Featured Refcardz: Top Refcardz:
    1. Design Patterns
    2. OO JS
    3. Cont. Delivery
    4. Java EE7
    5. HTML5 Mobile
    1. Java EE7
    2. Spring Annotations
    3. Git
    4. Java
    5. REST