QUICK NOTES WARNING
A collaborative association doing research in computer security based in Luxembourg.
Started with Honeynets… [2] (from flickr : diverslog/189275882/)
Honeynet is like the anemone for the clown anemonefishes for the attackers. Honeynet look very friendly to the attackers… and oops, we take a picture ;-)
The scope of honeynet is very large and covering various aspects from Reverse Engineering, Log Analysis, network analysis and monitoring… The collection of malware is like a distributed low-interaction honeynet.
Internet geography is not conventional geography. The map is built around the connectivity. There is no such thing like boundary.