(ediazc) Recently one of our costumer needed we protect a log file from tampering. The requirement was to mantain a log file of the main activities made by the user insde the system. For different reasons, no database was allowed, so we needed to make this log using plain files. Some of the fiel
Read More - Register for Free Membership