23-08-2013, 04:11 PM
1. what is the process and steps involved in setting up an IT security honey pot experiment?
2.what type of software and equipment requrired to construct the honey pot experiment ?
3.how you would monitor and log the activity while the honey pot operation is running?