YURTSEVEN.ORG is completely for sale, including Databases and Domainname.    Call with Whatsapp
View Stats!View Stats!
     
     
Yurtseven.ORG
 Yurtseven.ORG
 

 
HOME Security Security Honeypots and Honeynets Honeypots and Honeynets


Sort by Sort by          Date Sort by       Alphabetical Sort by

Showing  1 - 10  of total  73  results  [ 0.75  seconds ]  


 
   
  07-January-2012 
A free, distributed, open-source project to help website administrators track, stop, and prosecute spam harvesters stealing email addresses from their sites.



 
   
  07-January-2012 
A community of organizations actively researching, developing and deploying Honeynets and sharing the lessons learned.



 
   
  07-January-2012 
European Network of Affiliated Honeypots.



 
   
  07-January-2012 
Paper on the use of honeynets to learn more about botnets. Covers uses of botnets, how they work and how to track them.



 
   
  07-January-2012 
This two-part paper discusses how hackers discover, interact with, and sometimes disable honeypots at the system level and the application layer.



 
 6 - Honeyblog Browse Website open in new window
   
  07-January-2012 
A weblog about with IT-security, honeypots, and honeynets.



 
 7 - mwcollect Browse Website open in new window
   
  07-January-2012 
A solution to collect worms and other autonomous spreading malware in a non-native environment like FreeBSD or Linux. Some people consider it a next generation honeypot, however computers running mwcollect cannot actually be infected with the malware.



 
 8 - Nepenthes Browse Website open in new window
   
  07-January-2012 
A low interaction honeypot designed to emulate vulnerabilties worms use to spread, and to capture these worms.



 
   
  07-January-2012 
This paper evaluates the usefulness of using honeypots to fight spammers.



 
   
  07-January-2012 
A Darknet is a portion of routed, allocated IP space in which no active services or servers seemingly reside. However, there is in fact include at least one server for real-time analysis or post-event network forensics.


1  2  3  4  5  6  7  8  Next »


SUPERINTELLIGENCE-HUMANITY
The Book of the 21. Century