I have it installed, and I can look up the parameters in the command. What I don't understand is how I use it to investigate intrusions. Can someone shed some light on this?
-- Jason Hsu <[email protected]> -- To UNSUBSCRIBE, email to [email protected] with a subject of "unsubscribe". Trouble? Contact [email protected] Archive: http://lists.debian.org/[email protected]

