* Talks about hardening a Windows host before deploying Honeypot *
Covers how to create your own emulated services to fool hackers *
Discusses physical setup of Honeypot and network necessary to draw
hackers to Honeypot * Discusses how to use Snort to co-exist with
Honeypot * Discusses how to use a Unix-style Honeypot to mimic a
Windows host * Discusses how to fine-tune a Honeypot * Discusses OS
fingerprinting, ARP tricks, packet sniffing, and exploit signatures
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!