This is an old revision of this page, as edited by 220.253.32.170 (talk) at 23:17, 24 November 2005. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
Revision as of 23:17, 24 November 2005 by 220.253.32.170 (talk)(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)This computer networking article is a stub. You can help Misplaced Pages by expanding it. |
Victim host's also termed as honey pots. These are PC's running special software, which to any intruder appear as a compromised resource. They are used to gain the attention of the intruder, and keep them 'busy'. This keeps the intruders away from the real systems and protect them from being compromised. By looking at the patterns the intruder is using to hack, can be used to make the other systems stronger and hence less vulnerable.