tag:blogger.com,1999:blog-2382366207824767968.post8935876935861589891..comments2023-07-25T06:57:29.424-04:00Comments on red|blue: Using the Modern Honey Network to Detect Malicious ActivityUnknownnoreply@blogger.comBlogger5125tag:blogger.com,1999:blog-2382366207824767968.post-62441888478190472412016-01-27T06:25:09.253-05:002016-01-27T06:25:09.253-05:00All businesses are vulnerable to cyber attacks, es...All businesses are vulnerable to cyber attacks, especially the ones that don't have a special part of their budget intended for hacker attacks prevention.data room servicehttp://www.gmhchousing.org/vdr-more-than-an-ordinary-online-storage/8683noreply@blogger.comtag:blogger.com,1999:blog-2382366207824767968.post-62022652947575251542015-09-30T12:47:51.643-04:002015-09-30T12:47:51.643-04:00I'd caution the use of Docker for honeypots bu...I'd caution the use of Docker for honeypots but other than that great stuff!Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-2382366207824767968.post-45074398716951614702015-09-29T07:28:55.764-04:002015-09-29T07:28:55.764-04:00Thanks, good point :)Thanks, good point :)David Wellshttps://www.blogger.com/profile/03535045229479020690noreply@blogger.comtag:blogger.com,1999:blog-2382366207824767968.post-87389597899236538322015-09-29T07:25:31.342-04:002015-09-29T07:25:31.342-04:00p0f is not a honey pot. This is passive OS fingerp...p0f is not a honey pot. This is passive OS fingerprinting application. Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-2382366207824767968.post-67685529148094959052015-09-27T14:33:15.636-04:002015-09-27T14:33:15.636-04:00Good work Davidino!Good work Davidino!Anonymoushttps://www.blogger.com/profile/08744056233643140690noreply@blogger.com