Figure 3-17 DDNS Status Screen
3.4 Viewing the Tools
3.4.1 System Log
You can acquire the information of the system in this screen, including the time, the type and the message.
Figure 3-18 System Log
3.4.2 Hacker Log
You can detect the intrusion from this screen. This screen shows the information of the unauthorized access
request to your network. See Figure 3-19 Hacker Log Menu Screen.
-18-