Misplaced Pages

Victim host: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactivelyNext edit →Content deleted Content addedVisualWikitext
Revision as of 08:19, 5 November 2005 edit210.211.246.167 (talk) Victim host's also termed as honey pot's.  Revision as of 04:46, 11 November 2005 edit undoXaosflux (talk | contribs)Edit filter managers, Autopatrolled, Bureaucrats, Importers, Interface administrators, Oversighters, Administrators83,936 editsNo edit summaryNext edit →
Line 1: Line 1:
Victim host's also termed as honey pot's. These are PC's running special software, which to any intruder appear as a compromised resource. They are used to gain the attention of the intruder, and keep them 'busy'. This keeps the intruders away from the real systems and protect them from being compromised. By looking at the patterns the intruder is using to hack, can be used to make the other systems stronger and hence less vulnerable. Victim host's also termed as honey pot's. These are PC's running special software, which to any intruder appear as a compromised resource. They are used to gain the attention of the intruder, and keep them 'busy'. This keeps the intruders away from the real systems and protect them from being compromised. By looking at the patterns the intruder is using to hack, can be used to make the other systems stronger and hence less vulnerable.

{{stub}}

Revision as of 04:46, 11 November 2005

Victim host's also termed as honey pot's. These are PC's running special software, which to any intruder appear as a compromised resource. They are used to gain the attention of the intruder, and keep them 'busy'. This keeps the intruders away from the real systems and protect them from being compromised. By looking at the patterns the intruder is using to hack, can be used to make the other systems stronger and hence less vulnerable.

This article is a stub. You can help Misplaced Pages by expanding it.