O'Reilly logo

Privacy Defended: Protecting Yourself Online by Chris Weber, William Chan, Gary Bahadur

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Collecting Evidence

Your log files are the best evidence you can collect to track attacks against your system and use for prosecution in the off-chance that you get authorities to track, capture, and prosecute an attacker. Yes, that does sound like no one cares about your computer, but the reality of home system compromise is that no government agency cares enough to help you. It's up to you to protect yourself and stop the attackers. In that case, you probably don't have to worry much about collecting evidence of an attack for legal prosecution, but you should know the basics behind collecting evidence like corporations do for prosecution.

Collecting all log traffic and attack signatures is a time-consuming and tedious process. You have to save ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required