I was on an IRC channel a week ago, and we were discussing how to monitor systems. A few people state that they investigate suspicious reboots, kernel revisions, and so on which led to discussion ...