Honey pots have several advantages, which are as follows:

* Small set of data: Honey pots collect small amounts of data, but almost all of this data is about real attacks or unauthorized activity.
* Reduced false positives: Honey pots almost detect or capture attacks or unauthorized activities that reduce false positives.
* False negatives: Honey pots detect and record any unseen or unnoticed attacks or behavior.
* Cost effective: Honey pots only interact with malicious activity. So there is no need for high performance resources.

Honey pots also have some disadvantages, which are as follows:

* Limited View: Honey pots can only see activities that interact with them. They cannot see or capture any attacks directed against existing systems.
* Discovery and Fingerprinting: Honey pots can be easily detected and fingerprinted by several tools.
* Risk of takeover: Since there are many security holes in honey pots, a malicious attacker can takeover the honey pot and can use it to gain access and hack other networks.

Explore More

[Crimeware] Researches and Reversing about Eleonore Exploit Pack

A very nice paper about eleonore exploit pack by Evilcry /*##############################################*/ Hi, Today we will see how works Eleonore Exploit Pack directly from an infected website. Essentially Eleonore Exploit Pack

Finding vulnerabilities in PHP scripts

Contents : * 1) About * 2) Some stuff * 3) Remote File Inclusion * 3.0 – Basic example * 3.1 – Simple example * 3.2 – How to fix

10 steps you can take to improve your online security

1. Ensure that you login to an official site * Ensure that you login to an official site (eg. http://www.planetcreator.net) 2. Choose passwords that are hard to guess. Avoid using