This page has moved to a new address.
Securing the Oracle Listener, Part III: Logging and Monitoring Listener Activity