Misplaced Pages

Victim host: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively← Previous editContent deleted Content addedVisualWikitext
Revision as of 14:52, 19 January 2006 edit193.254.155.48 (talk) They don't have to be PCs← Previous edit Latest revision as of 03:37, 24 January 2008 edit undoRadagast83 (talk | contribs)18,709 edits completed merger 
(12 intermediate revisions by 11 users not shown)
Line 1: Line 1:
#REDIRECT ]
{{Compu-network-stub}}

Victim host's also termed as ]. These are computers running special software, which to any intruder appear as a compromised resource. They are used to gain the attention of the intruder, and keep them 'busy'. This keeps the intruders away from the real systems and protect them from being compromised. By looking at the patterns the intruder is using to hack, can be used to make the other systems stronger and hence less vulnerable.

Latest revision as of 03:37, 24 January 2008

Redirect to: