On 8/24/07, Lars Noodin <[EMAIL PROTECTED]> wrote: > Is there a recommended best practice for securing a remote log server? > > Is it worth it to try to tunnel between the machines?
Would be good to know what is meant by "securing", as in "what exact sense of security are you trying to address?" DS