11Mbps Wireless Internet Broadband Router
Figure 3-20 System Log
3.4.2 Hacker Log
You can detect the intrusion from this screen. This screen shows the information of the unauthorized access request to your network. See Figure
Figure 3-21 Hacker Log Menu Screen
31