I thought this was a great scenario, using vmware as a honeypot by simulating a whole network using nothing but 1 machine and multiple virtual machines with different O/S's http://www.vmware.com/solutions/scenarios/security.html -----Original Message----- From: plug-discuss-admin@lists.PLUG.phoenix.az.us [mailto:plug-discuss-admin@lists.PLUG.phoenix.az.us]On Behalf Of Trent Shipley Sent: Friday, July 07, 2000 10:34 AM To: plug-discuss@lists.PLUG.phoenix.az.us Subject: RE: Prot probes If you can afford it, you can always leave a honey pot. Set up a machine that is not protected, log all transactions to tape . . . > -----Original Message----- > From: plug-discuss-admin@lists.PLUG.phoenix.az.us > [mailto:plug-discuss-admin@lists.PLUG.phoenix.az.us]On Behalf Of > Barnett, Blake > Sent: Friday, July 07, 2000 9:37 AM > To: 'plug-discuss@lists.PLUG.phoenix.az.us' > Subject: RE: Prot probes > > > Another fun trick is to download or create a simple logging daemon that > listens to a port and finds out exactly what they are probing for... > attrition.org has one... > > * Blake > > > _______________________________________________ Plug-discuss mailing list - Plug-discuss@lists.PLUG.phoenix.az.us http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss