Analysis and Correlation of Macintosh Logs

Provided by: SecurityTube.net
Topic: Enterprise Software
Format: Webcast
In this webcast, the presenter will cover the variety of logs, tools to read them and analysis of additional file system files to provide a clear picture of events. User, network, or software activities can provide a timeline that can be used to uncover the clandestine activity on the system-whether or not it was meant to be secret.

Find By Topic