13,420
edits
Changes
no edit summary
|}
<ol><li value="17">Finally , as a system administrator , you should periodically monitor your system logs for unauthorized login attempts.</li>
<li>On CentOS systems the log file that is used is '''/var/log/secure''' </li>
<li>It also logs all uses of the '''su''' and '''sudo''' commands.</li>