Linux User and Developer  |  Issue 182
CAPTURE INTRUDERS
Organisations are always innovating to maintain a proactive defence against internet threats. To achieve this they create real structures for potential attackers in the hope of fooling them into thinking that their attack is being
carried out against a real infrastructure. In this feature we look at honeypots, which are either software or a set of assets that tries to ‘seduce’ attackers by pretending to be a vulnerable system and once attackers are lured in, the honeypot studies the attack behaviour to learn the latest techniques that need to be countered.
read more
read less
As a subscriber you'll receive the following benefits:
• A discount off the RRP of your magazine
• Your magazine delivered to your device each month
• You'll never miss an issue
• You’re protected from price rises that may happen later in the year
You'll receive 13 issues during a 1 year Linux User and Developer magazine subscription.
Note: Digital editions do not include the covermount items or supplements you would find with printed copies.
Articles in this issue
Below is a selection of articles in Linux User and Developer Issue 182.