
11Mbps Wireless Internet Broadband Router
31
Figure 3-20 System Log
3.4.2 Hacker Log
You can detect the intrusion from this screen. This screen shows the information of the
unauthorized access request to your network. See Figure 3-21 Hacker Log Menu
Screen.
Figure 3-21 Hacker Log Menu Screen