On Monday 19 April 2004 4:54 pm, Michael Gale wrote: > I have also thought about a internal machine (not sure of the technical name > for it) Honeypot or honeynet (depending on whether there's one or several machines involved). > to act as a live bit box. I believe the theory is that you leave a internal > box a little open or un-patched with bogus data on it, this is used to > attract the attacker and trigger other bells and whistles. Regards, Antony. -- Behind the counter a boy with a shaven head stared vacantly into space, a dozen spikes of microsoft protruding from the socket behind his ear. - William Gibson, Neuromancer (1984) Please reply to the list; please don't CC me.