The only log-specific way that I can think of to solve this would be to have the apps write out their own logs to one single file (not using system logging like syslog), and have the apps cryptographically sign the file so that you can be sure that nothing is tampering with them. That way, so long as the file exists at all (which, if they have used even one of the apps, is a given unless they are hiding logs from you), you get all of the usage info you need. Moving a little off-topic, there are lots of other non- log-related solutions that people have come up with over the years, such as activation codes and "phone home" licensing mechanisms. Those probably aren't appropriate for disucssion here, though. -- Sweth. -- Sweth Chandramouli ; <svcat_private> President, Idiopathic Systems Consulting --------------------------------------------------------------------- To unsubscribe, e-mail: loganalysis-unsubscribeat_private For additional commands, e-mail: loganalysis-helpat_private
This archive was generated by hypermail 2b30 : Mon Mar 11 2002 - 07:35:41 PST