I have it installed, and I can look up the parameters in the command.

What I don't understand is how I use it to investigate intrusions.  Can someone 
shed some light on this?

-- 
Jason Hsu <jhsu802...@jasonhsu.com>


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110302220041.35071bf9.jhsu802...@jasonhsu.com

Reply via email to