Needless to say I quickly felt like lost. So I had a few questions for the handful of pros on here.
- Do you ever use these?
- Can you give me good case examples?
- Is this something worth understanding?
It seems to me this would be good to use for some security measures and logging but not much else. Am I wrong?
Thanks in advanced.