YURTSEVEN.ORG is completely for sale, including entire Databases and Domainname.    Price: USD 49.900,-    Phone: +49(176)74919078
     
     
Yurtseven.ORG
 Yurtseven.ORG
     
HOME Security Security Honeypots and Honeynets Honeypots and Honeynets
 
Sort by Sort by          Date Sort by       Alphabetical Sort by

Showing  1 - 10  of total  73  results  [ 0.137  seconds ]  


 
   
  07-January-2012 
A free, distributed, open-source project to help website administrators track, stop, and prosecute spam harvesters stealing email addresses from their sites.



 
   
  07-January-2012 
A community of organizations actively researching, developing and deploying Honeynets and sharing the lessons learned.



 
   
  07-January-2012 
European Network of Affiliated Honeypots.



 
   
  07-January-2012 
Paper on the use of honeynets to learn more about botnets. Covers uses of botnets, how they work and how to track them.



 
   
  07-January-2012 
This two-part paper discusses how hackers discover, interact with, and sometimes disable honeypots at the system level and the application layer.



 
 6 - Honeyblog Browse Website open in new window
   
  07-January-2012 
A weblog about with IT-security, honeypots, and honeynets.



 
 7 - mwcollect Browse Website open in new window
   
  07-January-2012 
A solution to collect worms and other autonomous spreading malware in a non-native environment like FreeBSD or Linux. Some people consider it a next generation honeypot, however computers running mwcollect cannot actually be infected with the malware.



 
 8 - Nepenthes Browse Website open in new window
   
  07-January-2012 
A low interaction honeypot designed to emulate vulnerabilties worms use to spread, and to capture these worms.



 
   
  07-January-2012 
This paper evaluates the usefulness of using honeypots to fight spammers.



 
   
  07-January-2012 
A Darknet is a portion of routed, allocated IP space in which no active services or servers seemingly reside. However, there is in fact include at least one server for real-time analysis or post-event network forensics.


1  2  3  4  5  6  7  8  Next »


Easy Web Admin


Add URL  |  My Sites  |  My Account  |  Login  |  Contact Us