Analysis of authentication log files in an operating system. Ssh connection through a terminal to test intrusion in an operating system