Error opening template: advertisement/zones/468x60_generic.tplError opening template: advertisement/zones/728x90_leaderboard.tplError opening template: advertisement/zones/728x90_bottom_ad.tplError opening template: advertisement/zones/300x250_right_ros_up.tplError opening template: advertisement/zones/300x250_right_ros_down.tplError opening template: advertisement/zones/160x600_left_nav.tplError opening template: advertisement/zones/160x600_right_nav.tpl How a Honey Monkey Works

How a Honey Monkey Works

A honey monkey is a new method that is used to identify websites that exploit vulnerabilities in Web browsers. Honey monkeys are set up on a network of computers for the sole purpose of crawling the Internet and searching for websites that use malicious codes to install malware on your computer.

How a Honey Monkey Works

A honey monkey consists of a virtual computer network that is designed for browsing the Internet to discover websites that contain files with malicious intent by detecting harmful codes that are embedded into the infrastructure of the site. In addition to searching for malicious websites, the honey monkey computer is used to receive the malware in an effort to identify the hacker and develop solutions for patching Web browser vulnerabilities and improving Web browser security.

Honey monkeys contain a software system that is similar to the system in personal computers. The software systems form a virtual network system that searches the Internet for websites that contain malicious codes that can be downloaded by unsuspecting computer users. The websites that are visited by the honey monkey are seen in the same way as a personal computer would view them, only the honey monkey is simulating the computers that are running on a Windows platform.

When the malicious file is detected on the website by the honey monkey, an alarm system is set off in the honey monkey computer. After the alarm is set off, logs and reports of the websites are automatically generated. The logs and reports describe the nature of the malicious file as well as the website of origin.

Strider Honey Monkey

A strider is a specific type of software that is used in conjunction with a honey monkey that is designed to identify the intentions that the malicious code has for the receiving computer. It assesses the harmful code injection and the damage that it can inflict of the computer's operating system and parameters. This process is known as a strider honey monkey.

Honey monkey systems are used to help identify vulnerabilities in Web browsers so that a security patch can be developed to repair the problem. They are also used to identify hackers and the websites they use to generate malicious code. Honey monkeys are useful for preparing the public for future attacks and are the primary tools used by Microsoft and others for developing security patches that improve Web browser security. They are also used by companies and organizations to provide added security to the network system.

(0 Comments)
Log in or sign up to comment.

Post a comment

Log in or sign up to comment.
Identity theft comes in many forms.

A person\92s identity can be 'borrowed' for the purpose of creating fictional credit cards or a person\92s entire identity can be usurped to the point where they can have difficulty proving that they really are who they claim to be.

Up to 18% of identity theft victims take as long as four years to realize that their identity has been stolen.

There are many ways to protect your personal identity and many steps you can take to prevent your identity from being stolen:

*Never give out unnecessary personal information
*Never provide bank details or social security numbers over the Internet
*Always remain aware of who is standing behind you when you type in your personal credit codes at ATM machines and at supermarket checkout swipe machines.