Hi,
I have a newbie question related to intrusion detection. It was
suggested to me that Honeypots only catches automated attacks, is that
true? How can we know which attacks are not caught? Is there any papers
on what sort of attacks are caught by using honeypots?
Regards
Tomas
-----------------------------------------------------------------
Securing Your Online Data Transfer with SSL.
A guide to understanding SSL certificates, how they operate and their
application. By making use of an SSL certificate on your web server, you can
securely collect sensitive information online, and increase business by giving
your customers confidence that their transactions are safe.
http://www.dinclinx.com/Redirect.aspx?36;5001;25;1371;0;1;946;9a80e04e1a17f194