Aimster to unite IM services

Share on facebook
Share on twitter
Share on linkedin
Share on whatsapp
Aimster to unite IM services

Network security analysts frequently use a tool known as a honeypot, an apparently vulnerable network with an internet connection, to attract hackers who use illegal means to penetrate systems. The purpose of the counterfeit systems is to create an environment where hackers can be observed to the end that the observers can design systems capable of withstanding similar attacks. While the concept and use of honeypots is not new, the fact that one practitioner,, has made the organization’s activities and observations freely available on the Web is.

For more information, read and