Honey pots have several advantages, which are as follows:

* Small set of data: Honey pots collect small amounts of data, but almost all of this data is about real attacks or unauthorized activity.
* Reduced false positives: Honey pots almost detect or capture attacks or unauthorized activities that reduce false positives.
* False negatives: Honey pots detect and record any unseen or unnoticed attacks or behavior.
* Cost effective: Honey pots only interact with malicious activity. So there is no need for high performance resources.

Honey pots also have some disadvantages, which are as follows:

* Limited View: Honey pots can only see activities that interact with them. They cannot see or capture any attacks directed against existing systems.
* Discovery and Fingerprinting: Honey pots can be easily detected and fingerprinted by several tools.
* Risk of takeover: Since there are many security holes in honey pots, a malicious attacker can takeover the honey pot and can use it to gain access and hack other networks.

Explore More

The Internet or Cyber Laws

Internet is a behemoth, cutting across physical country boundaries and accessible to anyone and everyone from any corner of the world. Precisely due to this pervading nature, Internet is not

BurmeseHackers Group Hacked Irrawaddy Online Store

BurmeseHackers Group Hacked Irrawaddy Online Store Last night a hacker group named “BurmeseHackers” hacked Irrawaddy Online Store owned by Irrawaddy News Magaine, The Irrawaddy magazine and its Web site cover

Critical SQL Injection (http://www.mysuboo.com)

Today we shall consider the SQL Injection error on the site http://www.mysuboo.com/. Applications: ———— PlanetCreator’s_Universal_Advanced_Internet_Security_T00L System Time: ———— (UTC+08:00) Kuala Lumpur, Singapore, 03/23/2010 01:01:56 AM Site : http://www.mysuboo.com/ SQL Version