I have it installed, and I can look up the parameters in the command. What I don't understand is how I use it to investigate intrusions. Can someone shed some light on this? -- Jason Hsu <jhsu802701@jasonhsu.com>