Client honeypot
Honeypots are security devices whose value lie in being probed and compromised. Traditional honeypots are servers (or devices that expose server services) that wait passively to be attacked. Client Honeypots are active security devices in search of malicious servers that attack clients. The client honeypot poses as a client and interacts with the server to examine whether an attack has occurred. Often the focus of client honeypots is on web browsers, but any client that interacts with servers can be part of a client honeypot (for example ftp, ssh, email, etc.).
Wikipage redirect
primaryTopic
Client honeypot
Honeypots are security devices whose value lie in being probed and compromised. Traditional honeypots are servers (or devices that expose server services) that wait passively to be attacked. Client Honeypots are active security devices in search of malicious servers that attack clients. The client honeypot poses as a client and interacts with the server to examine whether an attack has occurred. Often the focus of client honeypots is on web browsers, but any client that interacts with servers can be part of a client honeypot (for example ftp, ssh, email, etc.).
has abstract
Honeypots are security devices ...... uld be clear from the context.
@en
Kliencki honeypot to rodzaj sy ...... kiego honeypota (patrz niżej).
@pl
Активная система обнаружения о ...... ии Интернет страниц браузером.
@ru
Link from a Wikipage to an external page
Wikipage page ID
Wikipage revision ID
738,416,501
subject
hypernym
type
comment
Honeypots are security devices ...... xample ftp, ssh, email, etc.).
@en
Kliencki honeypot to rodzaj sy ...... częścią klienckiego honeypota.
@pl
Активная система обнаружения о ...... ассивные системы называют СОВ.
@ru
label
Client honeypot
@en
Client honeypot
@ru
Kliencki honeypot
@pl