Difference between revisions of "Raspberry Pi Honey Pot"
From RiceFamily Wiki
(Created page with "Category:Raspberry Pi Category:Security Category:Project") |
|||
Line 1: | Line 1: | ||
+ | = Introduction = | ||
+ | A Honey Pot is used as a way to attract attackers and attempt to either distract them or discover their attack methods so that you can better protect "live" systems from their attacks. | ||
+ | |||
+ | = Articles = | ||
+ | * [http://www.linux-magazine.com/Issues/2015/178/Honeypots-for-the-Pi Honeypots for the Raspberry Pi] | ||
+ | * [http://www.linux-magazine.com/Issues/2009/101/Honeynet HoneyNet] | ||
+ | |||
[[Category:Raspberry Pi]] | [[Category:Raspberry Pi]] | ||
[[Category:Security]] | [[Category:Security]] | ||
[[Category:Project]] | [[Category:Project]] |
Latest revision as of 04:57, 28 December 2016
Introduction
A Honey Pot is used as a way to attract attackers and attempt to either distract them or discover their attack methods so that you can better protect "live" systems from their attacks.