Production honeypots can be used to protect your network by intercepting attack probes intended for IP addresses that are currently unused and sending to the honeypot. The honeypot will then interact with the attacker leading it to believe it's a different system than it really is. This can be combined with tarpitting to slow attackers. Honeypots are an exciting new technology. They allow us to turn the tables on the bad guys, we can take the initiative. In the past several years there has been growing interest in exactly what this technology is and how it works. The purpose of this paper is to introduce you to honeypots and demonstrate their capabilities. We will begin by discussing what a honeypot is and how it works, then go into detail using the OpenSource solution Honeyd.

Web-based applications: Shopping carts

Web-based applications: Shopping carts - "What is a shopping cart? Well, a shopping cart is a piece of software that sits in the cgi-bin of your webserver (if it's perl-based) or it sits in some other directory if it uses php, for example. But wherever this software lives, what it does is the same. It takes orders. It presents your products to people on the internet.

HOWTO: [OSX] Install Apache/PHP/MySQL/PostreSQL

HOWTO: [OSX] Install Apache/PHP/MySQL/PostreSQL This howto assumes basic knowledge of UNIX systems. We assume that you have installed the developer tools and have gcc installed (comes with developer tools). It is also assumed that you have enabled the root user. This can be done using NetInfo Manager. This documentation is provided without any kind of guarantee, use it at your own risk.

Killing spam while using the Qmail MTA

Chris Hardie's Qmail Anti-Spam HOWTO is a good resource. You will find this to be quite thorough. Georg Lehner has written "How to use Spamassassin together with Qmail." In it Georg describes how to setup Qmail with Spamassassin to meet your needs. You should also checkout Vipul's Razor: Vipul's Razor is what you now commonly know as SpamNet.