Linux Format

Dshield Pi honeypot

Baiting attackers towards your own hardware might not seem a particularly good idea, but if that hardware has nothing of value on to it, and is suitably isolated from your other machines that do, then you can more or less lure them in with impunity. The goal of setting up a honeypot is not to revenge hack attackers, but rather to detect attacks, and distract those responsible from more valuable targets.

Opening your home network up to the internet isn’t something that should be done lightly though. If the honeypot machine were to be compromised, then it could be used a staging post for attacking any services running on your network, including

You’re reading a preview, subscribe to read more.

More from Linux Format

Linux Format12 min read
Let’s Code Some Demos Like It’s 1990!
Ferenc Deák never throws anything away, which is why he still has all his demoscene files. Sadly, it also means his fridge is a no-go zone. It all started when this author’s beloved retro PC, used to host nostalgic gaming sessions, I suddenly suffer
Linux Format1 min read
Nvk Is Go!
"NVK, the open source Vulkan driver for Nvidia hardware in Mesa, is ready for prime time. The merge request has landed, getting rid of the nonconformant implementation warnings and signalling to distros that it’s now time to start shipping NVK to use
Linux Format3 min read
Kernel Watch
Linus Torvalds announced the fourth RC (Release Candidate) for what will become Linux 6.9 in another few weeks. In his announcement, he noted that there was “Nothing particularly unusual going on this week – some new hardware mitigations may stand o

Related Books & Audiobooks