The Linux Talks
How to make a fake device on your network to see if anyone is trying to attack or hack into it. We can log this with the honeypot tool, pentbox. I am currently using Linux to achieve this. ... https://www.youtube.com/watch?v=1v-7i_0mkHw
12922685 Bytes