article thumbnail

Network Protection: How to Secure a Network

eSecurity Planet

Deception technology using honeypots and similar subterfuge can trigger alerts of both hackers and authorized users that might be attempting to perform malicious actions. More aggressive vendors might even intentionally oversell their clients.

Security 109
article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

And, but really, when I look back on that, you know, like, that was a shifting time for how people saw and treated the word hacker you know, when I grew up. You had to figure out how to configure Kermit, get passwords to get on. All those exercises, the honeypot or honeynet challenges I think that's what they were called in.

IT 40