Book Image

Joomla! Web Security

Book Image

Joomla! Web Security

Overview of this book

Table of Contents (16 chapters)
Joomla! Web Security
Credits
About the Author
About the Reviewer
Preface

Summary


In this chapter, we covered the very important and highly ignored topic of reading and analyzing log files, and the tools to deal with them. You learned the need to rotate and collect your log files for offline analysis and that they are a great way to see a "trend" that may be a precursor to an attack. Just remember to monitor AND backup your logs frequently.