S1 Episode 0 00:00:13
Share this video: 

Breach

The screen here shows the names of some real Linux server log files that a security engineer might be reviewing after a breach.

Clips