So, TonyBradley, what I think you propose is a honeypot (system setup to attract malicious users/apps) that can be used to log all scan/connect/intrusion attempts in order to track down infected...
Search:Type: Posts; User: ccKid; Keyword(s): Search: Search took 0.04 seconds.
Results 1 to 2 of 2
|
|