Building your own honeypot..

Catching a skilled intruder in the act can be a tricky business. Indeed, much of network security is essentially a sophisticated game of hide and seek, in which attackers camouflage themselves among legitimate traffic and doctor system logs to avoid detection. Even after discovering a security breach, administrators often find it difficult or impossible to determine the extent of the compromise or how it was accomplished. One trick favored by hunters since prehistoric times still proves useful in the world of digital networks: bait. Read on: [url][/url]