In this chapter, we covered the very important and highly ignored topic of reading and analyzing log files, and the tools to deal with them. You learned the need to rotate and collect your log files for offline analysis and that they are a great way to see a "trend" that may be a precursor to an attack. Just remember to monitor AND backup your logs frequently.
Joomla! Web Security
Joomla! Web Security
Overview of this book
Table of Contents (16 chapters)
Joomla! Web Security
Credits
About the Author
About the Reviewer
Preface
Free Chapter
Let's Get Started
Test and Development
Vulnerabilities
Anatomy of Attacks
How the Bad Guys Do It
php.ini and .htaccess
Log Files
SSL for Your Joomla! Site
Incident Management
Customer Reviews