Honeypots Get Started
Bring yourself up to speed with our introductory content
A honey monkey is a virtual computer system that is programmed to lure, detect, identify and neutralize malicious activity on the Internet. The expression, coined by Microsoft, is based on the term honey pot, which refers to a computer system expressly set up to attract and "trap" people who attempt to penetrate other people's computers... (Continued) Continue Reading
A honey pot is a computer system on the Internet that is expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems. Continue Reading
A honeynet is a network set up with intentional vulnerabilities; its purpose is to invite attack, so that an attacker's activities and methods can be studied and that information used to increase network security. Continue Reading
Evaluate Honeypots Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The founder of the Honeynet Project explains how honeypots work and how they complement other technologies. Continue Reading
Learn to apply best practices and optimize your operations.
Spoofing, diversion and obfuscation are all part of honeyd's powerful arsenal. Continue Reading
Problem Solve Honeypots Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Honeypots have long been used to track attackers' activity and defend against coming threats. In this tip, network security expert Anand Sastry describes the different types of honeypots and which is best for your enterprise. Continue Reading
Honeypots can provide a great deal of insight into an environment's attack activity. However, before implementing them, there are some significant issues that require careful consideration and planning. Continue Reading
Honeypots attract hackers like bees to honey. Continue Reading