1 Jul
2004
1 Jul
'04
08:43
Hello Philippe, one question to your great mail: Am Mittwoch, 30. Juni 2004 23:41 schrieb Philippe Vogel: [...]
- exchange system agains honeypod and log activities
With the last thing you can find what's going on and trace the intruders back to their origin.
Can you explain "honeypod"? I understand, that it is an exchange for the harmed machine, but how do you build a "honeypod"? Thank you in advance Manfred