I was on an IRC channel a week ago, and we were discussing how to monitor systems. A few people state that they investigate suspicious reboots, kernel revisions, and so on which led to discussion ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results