Trace Evidence; A Close Look at System Logs Provides Clues to Spot Hacking or Worm Activity.