Author: JT Smith
LinuxSecurity Contributor writes, “Hisham shares his experiences with building a virtual honeynet on his existing Linux box. He describes data capture
and control techniques, the types of honeynets, and configuration changes to get one running on your system.”
http://www.linuxsecurity.com/feature_stories/feature_story-100.html.
and control techniques, the types of honeynets, and configuration changes to get one running on your system.”
http://www.linuxsecurity.com/feature_stories/feature_story-100.html.
Category:
- Linux