analysis of an intrusion

Thought this article detailing tools and conclusions made based on an intrusion to a system the author administers. Just nice to see tools and analysis in action.