Ever wonder what monitoring a honeypot might be like? The folks over at SIG^2 have a Web site online where the handlers who monitor their honeypot post a daily diary. If you read the diary starting on November 2 you can gain some insight into what they've seen and how they work to bait intruders further. Their honeypot was compromised on that date and they've posted an analysis of the intrusion, which occured using Secure Shell (SSH) where they'd set of intentionally weak password.
* How and when to use Azure * How to integrate Azure with existing infrastructure including networking and Active Directory * How to Implement single pane of glass management for a complete hybrid environment