m logging everything remotely. If the solution is not real-time,
theoretically someone can gain unauthorized access and remove traces of
their entry before the logs are batched up and sent. This is what I want
to prevent.
Stephen Touset
Harald Fuchs wrote:
In article <[EMAIL PROTECTED]>,
Stephe
into this limitation, so all I can reason is
that either a) the functionality's in there, and my Google skills have
failed me, or b) there are valid reasons for the lack of inclusion, and
there's a simple workaround. If either is the case, please, let me know!
Thanks in advance.
-