10.5.4.6. Log files
If anything, the UNIX way of logging all kinds of activities
into all kinds of files confirms that "it is
doing something." Of course, log files should be checked
regularly, manually or automatically. Firewalls and other means of
access control tend to create huge amounts of log files, so the
trick is to try and only log abnormal activities.