These processes can take many various forms including: logging by the operating system, logging by a network device such as a router or firewall, or logging by an intrusion detection system (IDS), logging by an intrusion prevention system (IPS) or packet-capture (network sniffing) software and devices such as a PC with EtherPeek, Wireshark (formerly Ethereal), Snort, Kismet etc installed.