Thank you, but that have some problems:
- It can be modified if the hacker know the remote password.
- It will be easy to bypass just by turn off internet.
What I want is, the system will not allow sensitive operations without first send the log. Also, the remote log should never be able to be modified, that is, it should be read and add only, even with password.