11Mbps Wireless Internet Broadband Router
31
Figure 3-20
System Log
3.4.2 Hacker Log
You can detect the intrusion from this screen. This screen shows the information of the
unauthorized access request to your network. See Figure 3-21
Hacker Log Menu
Screen
.
Figure 3-21
Hacker Log Menu Screen