At 10:19 AM -0500 11/16/01, David Muszynski  imposed structure on a 
stream of electrons, yielding:
>Bill Cole imposed structure on a stream of electrons yielding:
>
>>  for making a honeypot.
>
>Alright, please explain. Is this a device that would grab bad clients and
>tie them up for a long time to foil bad guys?

Essentially, yes. A 'honeypot' in security jargon is any system that 
looks like an attractive target for intruders but which is in fact 
constructed specifically to attract the attention of anyone poking 
around looking for holes in a network.   The honeypot is actually 
watched rather closely so that any would-be attackers are identified 
there instead of after they've found some other hole somewhere that 
might actually reach important systems.


-- 
Bill Cole
[EMAIL PROTECTED]


#############################################################
This message is sent to you because you are subscribed to
  the mailing list <[EMAIL PROTECTED]>.
To unsubscribe, E-mail to: <[EMAIL PROTECTED]>
To switch to the DIGEST mode, E-mail to <[EMAIL PROTECTED]>
To switch to the INDEX mode, E-mail to <[EMAIL PROTECTED]>
Send administrative queries to  <[EMAIL PROTECTED]>

Reply via email to