News

The idea is simple: suppose you specify a bogus IP address in a syslog.conf action, i.e., an IP address legitimate for your host's LAN but that isn't actually used by any host running syslogd. Since ...
I have a custom firewall appliance (configured via a web app) where I am allowed to specify another machine to send log messages to.My question, what do I need to do to be able to receive those ...