theurbanpenguin.com
Auditing User Keystokes in Linux to Maintain Security and Compliance
Having looked at the Linux Audit system we now turn to auditing user keystokes. Suspicious user activity can be focused upon giving you evidence yuou need