This is an old revision of this page, as edited by 193.254.155.48 (talk) at 14:52, 19 January 2006 (They don't have to be PCs). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
Revision as of 14:52, 19 January 2006 by 193.254.155.48 (talk) (They don't have to be PCs)(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)This computer networking article is a stub. You can help Misplaced Pages by expanding it. |
Victim host's also termed as honey pots. These are computers running special software, which to any intruder appear as a compromised resource. They are used to gain the attention of the intruder, and keep them 'busy'. This keeps the intruders away from the real systems and protect them from being compromised. By looking at the patterns the intruder is using to hack, can be used to make the other systems stronger and hence less vulnerable.