title
intro
blocks
honeypot1
honeypot2
honeypot3
honeypot4
honeypot5
UML honeypot1
UML honeypot
Logging
Forensics
UML honeypot2
jailing
sandboxing
environment
Conclusion
Author: Jeff Dike
E-mail: jdike (at) karaya (dot) com
Homepage: http://user-mode-linux.sourceforge.net
Further information: This talk was prepared for and delivered at the New England NetSec Professional's Roundtable on May 17, 2002 at Dartmouth College.
Best viewed with
Download presentation