Hi there!
I found an article which seems to be quite interresting:
http://news.bbc.co.uk/2/hi/technology/5414502.stm
http://news.bbc.co.uk/2/hi/technology/6035455.stm
cu
Hi there!
I found an article which seems to be quite interresting:
http://news.bbc.co.uk/2/hi/technology/5414502.stm
http://news.bbc.co.uk/2/hi/technology/6035455.stm
cu
The honeypot schema has been around for quite some time. It's rather old news.![]()
Yes. I remember hearing about it in my Network Security class...it's a good way to figure things out, but it's definitely and older thing.
"Best to keep your mouth shut and be thought a fool than to open your mouth and remove all doubt."
"Honesty is the First Chapter in the Book of Wisdom" - Thomas Jefferson
Desktop:
AMD Phenom II x6 1100T @ 3.3Ghz
MSi 890FXA-GD70
16GB G.Skill DDR3-1600
Asus HD6950 2GB GDDR5 PCI-Ex16
4x 1.5TB WD SATA w/64MB cache in RAID10
2x Asus 22x DVD/CD +/-RW DL SATA
Rosewill Xtreme Series 950W PSU
2x 23" 5ms Asus Widescreen LCD
Laptop:
15" Aluminum MacBook Pro
Intel Core 2 Duo 2.53Ghz
4GB DDR3 @ 1067MHz
320GB SATA 7200RPM HDD
**View My Forum**
Alot of "insecure" game servers unwillingly become honeypots for haxors.
There are currently 1 users browsing this thread. (0 members and 1 guests)