What is the best way to detect when a user circumvents logging by temporarily embedding a YouTube video into PowerPoint?

The school has a few security measures in place to ensure students are not going to inappropriate sites based on content. In this day there are more students being sent to YouTube to watch educational videos that are assigned by the teache… Continue reading What is the best way to detect when a user circumvents logging by temporarily embedding a YouTube video into PowerPoint?

Is there a utility that identifies attack footprints in HTTPD log files? [duplicate]

We’re manually reading HTTPD log files and taking note of service abuse.
Example:
10.0.0.1 – – [01/Jan/1970:00:01:01 -0100] "GET /fckeditor/editor/filemanager/connectors/php/upload.php?Type=Media

10.0.0.2 – – [01/Jan/1970:00:01:10… Continue reading Is there a utility that identifies attack footprints in HTTPD log files? [duplicate]

Is there a utility that identifies attack footprints in HTTPD log files? [duplicate]

We’re manually reading HTTPD log files and taking note of service abuse.
Example:
10.0.0.1 – – [01/Jan/1970:00:01:01 -0100] "GET /fckeditor/editor/filemanager/connectors/php/upload.php?Type=Media

10.0.0.2 – – [01/Jan/1970:00:01:10… Continue reading Is there a utility that identifies attack footprints in HTTPD log files? [duplicate]

How do you find an attacker if he immediately cleans after himself?

Having an Ubuntu server with current software, updated daily, every 5 days or so someone gains root access. I know that from log watch.
I search the logs for his ip and it doesn’t show up.
He is probably using a VPN as once it’s in china, … Continue reading How do you find an attacker if he immediately cleans after himself?