October 27, 2008, 7:02 AM — Select Hardware for the Host
The first step for deploying a Honeypot is finding a machine that you are willing to sacrifice for the cause of being exploited, hacked and potentially purged of all data. This can be any computer capable of running the software for data capture and control.
Operating System Installation
The second step includes either making the necessary modifications to the current Operating System or performing a clean installation of a base operating system onto the machine. A clean installation of your target operating system offers the best method of controlling what vulnerabilities exist in the soon-to-be deployed host. Read the rest of this article>>