![]() ![]() This will take you through most of the more common honeypots in use, where to put them, how best to implement them, etc.ĭon’t put all your faith in a honeypot that it will protect your servers. I also suggest getting a copy of Lance Spitzner's book, Honeypots: Tracking Hackers. There are several different Web sites, such as, that you can go to for information. You also have to think about whether to put it inside and/or outside the firewall. ![]() This is just the start of implementing a honeypot. Available at is one of the more popular honeypot options available. A more robust honeypot by the name of Specter that can emulate different operating systems and more services than Back Officer Friendly is available from If you’re comfortable working with Linux, honeyd may be something you should look at. A basic Windows-based honeypot called Back Officer Friendly is available from They also have a Linux version available. Having said that, there are several ways you can implement a honeypot. If your attorney doesn’t specialize in subjects dealing with the Internet, find one who does and check with the person periodically to ensure you stay out of harm’s way in the legal area. The first thing I would do is check with your corporate attorney to see what the laws/regulations are in your state and or at the federal level before turning up a honeypot. ![]() This is a deep subject that will take more room than I have here, but I’ll give you some places to get started. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |