What kind of logs are left after an intrusion's been made into your system,I know about firewall logs but I heard that if you're on windows it's possible to detect an intrusion by looking at the kernel32.dll file.Comments people?