I have it installed, and I can look up the parameters in the command.

What I don't understand is how I use it to investigate intrusions.  Can someone 
shed some light on this?

-- 
Jason Hsu <[email protected]>


-- 
To UNSUBSCRIBE, email to [email protected] 
with a subject of "unsubscribe". Trouble? Contact [email protected]
Archive: http://lists.debian.org/[email protected]

Reply via email to