Quite a nice explanation of using honeypots.Also for anyone wondering, an explanation of how it works: http://www.quora.com/Network-Security/How-does-the-Norse-IPViking-Live-product-work
Very cool. Suddenly, it makes more sense.
Last edited:




