Revision as of 23:17, 24 November 2005 edit220.253.32.170 (talk)No edit summary← Previous edit | Revision as of 14:52, 19 January 2006 edit undo193.254.155.48 (talk) They don't have to be PCsNext edit → | ||
Line 1: | Line 1: | ||
{{Compu-network-stub}} | {{Compu-network-stub}} | ||
Victim host's also termed as ]. These are |
Victim host's also termed as ]. These are computers running special software, which to any intruder appear as a compromised resource. They are used to gain the attention of the intruder, and keep them 'busy'. This keeps the intruders away from the real systems and protect them from being compromised. By looking at the patterns the intruder is using to hack, can be used to make the other systems stronger and hence less vulnerable. |
Revision as of 14:52, 19 January 2006
This computer networking article is a stub. You can help Misplaced Pages by expanding it. |
Victim host's also termed as honey pots. These are computers running special software, which to any intruder appear as a compromised resource. They are used to gain the attention of the intruder, and keep them 'busy'. This keeps the intruders away from the real systems and protect them from being compromised. By looking at the patterns the intruder is using to hack, can be used to make the other systems stronger and hence less vulnerable.