Use this forum to post questions relating to WinGate, feature requests, technical or configuration problems
Jun 11 05 5:22 am
When you read the log for suspicious activities, what exactly you look for?
All I look is Wingate NAT. Even inside of Wingate NAT, I still don't know how to determine whethere someone got in.
Please educate me more.
Thanks,
xeo
Jun 13 05 4:46 pm
You might want to get a report of the WinGate logs. Here are some third party utilities to do this:
Proxy Inspector for WinGate:
http://www.advsoft.info/en/download/
Saw Mill:
http://www.sawmill.net/
Internet Access Monitor:
http://www.internetaccessmonitor.com/