Honey pots have several advantages, which are as follows:

* Small set of data: Honey pots collect small amounts of data, but almost all of this data is about real attacks or unauthorized activity.
* Reduced false positives: Honey pots almost detect or capture attacks or unauthorized activities that reduce false positives.
* False negatives: Honey pots detect and record any unseen or unnoticed attacks or behavior.
* Cost effective: Honey pots only interact with malicious activity. So there is no need for high performance resources.

Honey pots also have some disadvantages, which are as follows:

* Limited View: Honey pots can only see activities that interact with them. They cannot see or capture any attacks directed against existing systems.
* Discovery and Fingerprinting: Honey pots can be easily detected and fingerprinted by several tools.
* Risk of takeover: Since there are many security holes in honey pots, a malicious attacker can takeover the honey pot and can use it to gain access and hack other networks.

Explore More

Make your own Hardend Internet Firewall

Make your own “Hardend Internet Firewall” using that forgotton PC in your basement. Yes.. You know the PC I am talking about. We all have them. Remember that $3000 Pentium

Gmail/ Google apps down!

Gmail and Google apps are down for almost 2 hours now. News, reader etc are working fine. Everyone getting 502/503 after few minutes n loading the page. Nothing official from

SQL Commandos (usefull for injections)

Here is a list of SQL commands and what they do, these would be used in some injection methods and of course legitimate sql functions. On thier own they wont