Menu
Submit Site
Home
Computer
Security
All sites of Security
KeyFocus - KF Sensor - Honey pot IDS
KeyFocus - KF Sensor - Honey pot IDS- A Windows honeypot designed to attract and detect hackers by simulating vulnerable system services and trojans. ...
The Strider HoneyMonkey Project
The Strider HoneyMonkey Project- Microsoft Research project to detect and analyze Web sites hosting malicious code using client-side honeypots. ...
Anton Chuvakin Honeynet
Anton Chuvakin Honeynet- Live honeynet status data, papers produced as a result of research, and other related resources. ...
The Bait and Switch Honeypot System
The Bait and Switch Honeypot System- A system that redirects all hostile traffic from your production systems to a honeypot that is a partial mirror of your production system. Once switched, the would-be hacker is unknow ...
Open Proxy Honeypot
Open Proxy Honeypot- Web Application Security Consortium Distributed Open Proxy Honeypot Project. ...
Honeynet.org: Tracking Botnets
Honeynet.org: Tracking Botnets- Paper on the use of honeynets to learn more about botnets. Covers uses of botnets, how they work and how to track them. ...
HoneyC Low-Interaction Client Honeypot
HoneyC Low-Interaction Client Honeypot- A platform independent low interaction client honeypot that allows identify rogue servers on the web. ...
Honeywall
Honeywall- The Honeywall CDROM is a bootable CD that installs onto a hard drive and comes with all the tools and functionality for you to implement data capture, control and analysis. ...
Capture
Capture- A high interaction client honeypot. A client honeypot is a security technology that allows one to find malicious servers on a network. ...
NoAH
NoAH- European Network of Affiliated Honeypots. ...
MicroSolved, Inc.
MicroSolved, Inc.- Seller of HoneyPoint family of products. ...
Honeycomb
Honeycomb- A system for automated generation of signatures for network intrusion detection systems (NIDSs). ...
Google Hack Honeypot (GHH)
Google Hack Honeypot (GHH)- Emulates a vulnerable web application by allowing itself to be indexed by search engines. Project information and free download. ...
Know Your Enemy
Know Your Enemy- A series of white papers describing the concepts and technology of the Honeynet Project and Research Alliance and sharing lessons learned. ...
Honeywall CDROM
Honeywall CDROM- A honeynet gateway on a bootable CDROM. ...
Honeypot (computing) - Wikipedia
Honeypot (computing) - Wikipedia- Brief encyclopedia article describing Honeypots. ...
Honeypot + Honeypot = Honeynet
Honeypot + Honeypot = Honeynet- Article discussing the creation of the Honeynet Project. ...
Wikipedia: Client Honeypot
Wikipedia: Client Honeypot- Encyclopedia article about the security devices, including several examples. ...
Medium Interaction Honeypots
Medium Interaction Honeypots- Document outlines the weaknesses of different existing approaches to catch malware – especially bots – and shows how Medium Interaction Honeypots solves these problems. ...
HoneySink: Beta Release | The Honeynet Project
HoneySink: Beta Release | The Honeynet Project- HoneySink is an open source network sinkhole that provides a mechanism for detection and prevention of malicious traffic on a given network. ...
Glastopf Honeypot Project Page
Glastopf Honeypot Project Page- Glastopf is a small Python webserver which emulates thousands of web application vulnerabilities. ...
Honeyd Control Center
Honeyd Control Center- Honeyd configuration wizard, a SQL Interface, and reports. ...
Sysenter Honeynet Project
Sysenter Honeynet Project- A volunteer no-profit research organization. Aim is to provide information about emerging security threats and vulnerabilities active in the wild in order to learn tools, tactics, and motives o ...
Deploying and Using Sinkholes
Deploying and Using Sinkholes- Sink Holes - an ISP Security Tool ...
Thug low-interaction honeyclient
Thug low-interaction honeyclient- A Python low-interaction honeyclient aimed at mimicing the behavior of a web browser in order to detect and emulate malicious contents ...
Honeywords: Making Password-Cracking Detectable
Honeywords: Making Password-Cracking Detectable- Research paper suggesting a simple method for improving the security of hashed passwords: the maintenance of additional \honeywords" (false passwords) associated with each ...
Sweet Password Security Strategy: Honeywords - Security - Intrusion
Sweet Password Security Strategy: Honeywords - Security - Intrusion- To improve detection of database breaches, businesses should store multiple fake passwords and monitor attempts to use them, according to researchers a ...
For Stronger Password Security, Try a Spoonful of Honeywords
For Stronger Password Security, Try a Spoonful of Honeywords- Describing new scheme of password protection called honeywords. ...
HoneyDrive | Free software downloads at SourceForge.net
HoneyDrive | Free software downloads at SourceForge.net- Premiere honeypot bundle distro. ...
Tiny Honeypot (thp)
Tiny Honeypot (thp)- A simple honey pot program based on iptables redirects and an xinetd listener. ...
Honeypots: A Security Manager's Guide to Honeypots
Honeypots: A Security Manager's Guide to Honeypots- A discussion by Stephen Northcutt and Eric Cole, SANS Technology Institute, on the values and risks of deploying honeypots in one's organization. ...
APT detection system using honeypots
APT detection system using honeypots- APT detection system using honeypots ...
Valhala Honeypot | Free System Administration software downloads at SourceForge.net
Valhala Honeypot | Free System Administration software downloads at SourceForge.net- A honeypot for the Windows System with http (web), ftp, tftp, finger, pop3 enabled ...
webhoneypot - DShield.org Web Application Honeypot - Google Project Hosting
webhoneypot - DShield.org Web Application Honeypot - Google Project Hosting- Dshield web honeypot ...
SecurityFocus: Defeating Honeypots: System Issues, Part 1
SecurityFocus: Defeating Honeypots: System Issues, Part 1- This two-part paper discusses how hackers discover, interact with, and sometimes disable honeypots at the system level and the application layer. ...
HoneyBOT
HoneyBOT- A free windows based medium interaction honeypot solution. ...
Dynamic Honeypots
Dynamic Honeypots- Honeypots that dynamically learn your network then deploy virtual honeypots that adapt to your network. ...
Fighting Internet Worms With Honeypots
Fighting Internet Worms With Honeypots- This paper evaluates the usefulness of using honeypots to fight Internet worms and perform counterattacks. ...
Wireless Honeypots
Wireless Honeypots- Article discussing the use of honeypot technology to combat attacks on wireless networks. ...
The Team Cymru Darknet Project
The Team Cymru Darknet Project- A Darknet is a portion of routed, allocated IP space in which no active services or servers seemingly reside. However, there is in fact include at least one server for real-time analysis o ...
kippo - SSH Honeypot - Google Project Hosting
kippo - SSH Honeypot - Google Project Hosting- A medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker. ...
Honeytokens -The Other Honeypot
Honeytokens -The Other Honeypot- This paper discusses honeytokens, honeypots that are not computers, but rather digital entities that are stored in a restricted part of the network. ...
Problems and Challenges with Honeypots
Problems and Challenges with Honeypots- Article discussing issues with Honeypot technology, focusing on dealing with the possibility of your Honeypot being detected (and potentially abused) by an attacker. ...
Securityfocus: Fighting Spammers With Honeypots
Securityfocus: Fighting Spammers With Honeypots- This paper evaluates the usefulness of using honeypots to fight spammers. ...
SecurityFocus: Honeypot Farms
SecurityFocus: Honeypot Farms- This article is about deploying and managing honeypots in large, distributed environments through the use of Honeypot Farms. ...
SecurityFocus: Defeating Honeypots - Network issues, Part 1
SecurityFocus: Defeating Honeypots - Network issues, Part 1- Article discussing methods hackers use to detect honeypots. ...
W3C Security Resources
W3C Security Resources- Links to security initiatives such as PICS Signed Labels, and XML-DSig. (W3C) ...
Common Vulnerabilities and Exposures
Common Vulnerabilities and Exposures- A searchable database of internet security problems. ...
Dingbat's Warehouse
Dingbat's Warehouse- Information about viruses, intrusion detection software, personal firewalls, and privacy. Hosts a streaming webcast called The Byte Show on security-related topics; CD-ROMs of interviews and software ...
SuraSoft
SuraSoft- Offers news, tutorials, articles, and forum. ...
« First
Previous
Page 3 of 42.
Next
Last »
Latest sites from Security
HoneyDrive Desktop
SecureLab
Security Focus
CERT Coordination Center
CR80 News
Heimdal
CyberEvidence, Inc.
JurInnov Ltd.
G-C Partners
Secure Crossing
Privacy Scan
Red Iron
Degausser.co.uk
TSFactory
Nmap
Avatier Corporation
Yoggie Security Systems
Nsauditor.com
Inguama
Sybari Software, Inc.
Declude Virus
Avira
CAcert
Checkpoint
InfoExpress
Send feedback
submit