Site News


A survey, shows that less then 40% of the British public feel they are well informed about science.

New Articles - Earth's Carbon Cycle Ultra Sonic Frogs Environmental Niche & Dinosaurs Seismic Waves Global Warming Life Support Systems Introduction to the Big Bang The Problem of Acid Rain

Our science section is in production with a proposed 1 Mar 07 "Grand launch" date.


The Linux Convert site explains how, even today, building your own linux box can be cheaper than getting an off the shelf Windows PC. There is a new article on why you should use linux there now.

New articles: Firewall Bypass Attack Snort For Newbies Malware and Intrusions Intrusion Detection Systems Malware, Trojans and Virus infections and Infection Removal

If you have any comments or suggestions for topics we should cover under the technology banner then please stop by the discussion board and let us know.

Intrusion Detection Systems

Introduction into Intrusion Detection Systems (IDS)

In a similar manner to NIDS, these systems look for patterns in the log files that suggest an intruder is attacking. A typical example would be a parser for HTTP server log files that looks for intruders who try well-known security holes.

A third type of Intrusion Detection System includes deception systems also known as, decoys, lures, fly-traps and honeypots. These contain pseudo-services whose goal is to emulate well-known holes in order to trap hackers.

Honey pots are closely monitored network decoys serving several purposes: they can divert attackers from more valuable resources on a network, and can provide an early warning about new attacks and exploitations. They also allow for an in-depth examination of attacker behaviour during and after their exploration of the honeypot.

Honeypots are a flexible multi-use security tool and have many security applications; their purpose is not to fix problems. Instead they are used, for such measures as prevention, detection, or information gathering. A honeypot is a security resource whose value lies in being probed, attacked, or compromised.

An example of a honeypot is a system used to simulate one or more network services. An attacker assumes there are vulnerable services running that can be used to break into the machine. This kind of honeypot can be used to log access attempts to those ports including the attacker's keystrokes and general behaviour within the system. This could give advanced warning of a more concerted attack and better insight into how attackers probe systems.

Page 1 - Page 2 - Page 3 - Page 4 - Page 5 - Page 6 - Page 7

XHTML CSS level 2 W3 Sites Any Browser GEO Url


RSS Feed

News Provided By The BBC