Skip to content
Honeynet Project
Observe in real life attackers compromising systems
  • Home
  • About the project
  • Contact Us
  • Links
  • Network Topology
  • Customer area
  • Compromised OpenBSD 3.0 with SSH *GOBBLE*

Author: admin

Evaluation of means of registration of references to information subject to protection

March 11, 2021 admin

Evaluation of means of registration of references to information subject to protection Means for registering calls to information subject to…

Continue Reading →

Global Security Management Concept

February 18, 2021 admin

Centralized security management of corporate information systems is based on the concept of global security management GSM (Global Security Management).…

Continue Reading →

Interactions on the Internet of Things

January 14, 2021 admin

The Internet of Things is a computing network that has: main nodes – connected objects; servers for managing connected objects;…

Continue Reading →

Organizational measures for the control and management of information security

December 16, 2020 admin

In systems with a high degree of security, specialists who maintain a complex of information system automation tools during operation…

Continue Reading →

VPN solutions for building secure networks

November 17, 2020 admin

Currently, technologies for building virtual secure private networks (VPNs) are attracting more and more attention from large companies (banks, departments,…

Continue Reading →

Login control mechanisms

October 16, 2020 admin

Protection against unauthorized entry is designed to prevent unauthorized persons from accessing the protected computer. This group of funds, as…

Continue Reading →

Protecting password codes from unauthorized access

September 30, 2020 admin

Means of delimitation and access control work only when the actual values of the password code are not available to…

Continue Reading →

Classification of leakage channels

August 30, 2020 admin

It is known that information is transmitted by a field or substance. This is either an acoustic wave (sound), or…

Continue Reading →

Fundamentals of the theory of information security from unauthorized access

July 27, 2020 admin

To formulate the problem, we consider some initial conditions. Such conditions for us will create a model of the expected…

Continue Reading →

Network security services

June 23, 2020 admin

Authentication service This service in relation to virtual networks is called the object authentication service (single-level) and provides confirmation of…

Continue Reading →

Post navigation

Page 1 of 2
1 2 Next →
Privacy Policy
Copyright © 2022 Honeynet Project