"For months, you read logs that basically consist of the same sequence of messages. Then one morning, you see a different message.
Your first thought tends to be "I've been hit!" You want to determine whether the attack was successful. You comb through logs and
examine files on your systems, looking for signs of abnormal behavior. There are none; maybe the attack has failed." LinuxWorld's Jon Lasser provides a basic "defensive driving course" in Linux security.
January 26, 2001