YURTSEVEN.ORG is completely for sale, including entire Databases and Domainname.    Price: USD 49.900,-    Phone: +49(176)74919078
     
     
www.yurtseven.org
 www.yurtseven.org
 

 
 Computers » Security » Honeypots and Honeynets


 Web Pages    11 - 20   of   73 Back to Honeypots and Honeynets Home 


White papers, mailing list and other resources related to honeypots.

http://www.tracking-hackers.com/

[more pages from this URL] 


 12 - Honeypots Browse Website open in new window
Information covering intrusion detection and prevention systems, research and production honeypots, and incident handling. Also provides general overview of network security issues.

http://www.honeypots.net/

[more pages from this URL] 


 13 - Know Your Enemy Browse Website open in new window
A series of white papers describing the concepts and technology of the Honeynet Project and Research Alliance and sharing lessons learned.

http://www.honeynet.org/papers/

[more pages from this URL] 


Small daemon that creates virtual hosts on a network (honeypot). Can be used as a virtual honeynet, for network monitoring, or as a spam trap. For *BSD, GNU/Linux, and Solaris.

http://www.citi.umich.edu/u/provos/honeyd/

[more pages from this URL] 


 15 - LaBrea Tarpit Browse Website open in new window
A program that creates a tarpit or, as some have called it, a "sticky honeypot".

http://labrea.sourceforge.net/

[more pages from this URL] 


Brief encyclopedia article describing Honeypots.

http://en.wikipedia.org/wiki/Honeypot_(computing)

[more pages from this URL] 


Article discussing issues with Honeypot technology, focusing on dealing with the possibility of your Honeypot being detected (and potentially abused) by an attacker.

http://www.securityfocus.com/infocus/1757

[more pages from this URL] 


Article discussing the use of honeypot technology to combat attacks on wireless networks.

http://www.securityfocus.com/infocus/1761

[more pages from this URL] 


This white paper aims to provide practical information on the practice of phishing and draws on data collected by the German Honeynet Project and UK Honeynet Project.

http://www.honeynet.org/papers/phishing/

[more pages from this URL] 


This paper evaluates the usefulness of using honeypots to fight Internet worms and perform counterattacks.

http://www.securityfocus.com/infocus/1740

[more pages from this URL] 




«« Previous 1  2  3  4  5  6  7  8  Next »»




Easy Web Admin


Add URL  |  My Listings  |  My Account  |  New Membership  |  Contact