O'Reilly logo

Mac® Security Bible by Joe Kissell

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

19.6. Summary

The logs generated automatically by Mac OS X itself and by numerous other applications store crucial information about errors, network and file access, and other activities that could indicate security breaches of various kinds. This chapter discussed the kinds of information that can be stored in logs — where to find them, how to understand them, and how you can use them to increase your security. Apple's Console utility, included with Mac OS X, is usually the easiest way to examine log files.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required