Ever wonder what monitoring a honeypot might be like? The folks over at SIG^2 have a Web site online where the handlers who monitor their honeypot post a daily diary. If you read the diary starting on November 2 you can gain some insight into what they've seen and how they work to bait intruders further. Their honeypot was compromised on that date and they've posted an analysis of the intrusion, which occured using Secure Shell (SSH) where they'd set of intentionally weak password.
Join John Savill for 12 hours of comprehensive Hyper-V training. This master-level online training course will explore all the key aspects of a Hyper-V based virtualization environment covering both current capabilities in Windows Server 2012 R2 and looking at the future with Windows Server vNext.