TITLE

Start-up's `decoy' server helps track down hackers

AUTHOR(S)
Messmer, Ellen
PUB. DATE
August 1999
SOURCE
Network World;08/09/99, Vol. 16 Issue 32, p31
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Informs that start-up Recourse Technologies Inc. is releasing a software dubbed ManHunt, that can record would-be hackers' activities and trace intruders back across the Internet. Software serving as a `decoy' server; Background information on company.
ACCESSION #
2709508

 

Related Articles

  • RECOURSE TECHNOLOGIES DEBUTS MANTRAP 1.5 SECURITY SOFTWARE.  // Productivity Software;Mar2000, Vol. 13 Issue 3, pN.PAG 

    Reports the launching of the ManTrap 1.5 security software by Recourse Technologies Inc. in March 2000. Features of the software; Background on Recourse Technologies.

  • Who gets caught in network `honeypots'? Chowdhry, Pankaj // PC Week;11/01/99, Vol. 16 Issue 44, p85 

    Discusses the dilemma facing companies which have caught computer hackers. Testing of the Recourse Technologies ManTrap software; Consequences of prosecuting hackers; Web sites' vulnerability to denial-of-service attacks.

  • Hosting firm to put intrusion detection to the test. Messmer, Ellen // Network World;03/19/2001, Vol. 18 Issue 12, p14 

    Reports the launching the ManHunt and ManTrap intrusion-detection software from Recourse Technologies by Verado in Denver, Colorado. Capabilities of ManHunt and ManTrap software; Functionality of a firewall as barrier to the Internet against hackers; Plans of service provider Cactus to offer...

  • A fly-strip security scheme. Young, Kevin // PC Week;11/15/99, Vol. 16 Issue 46, p150 

    Features Recourse Technologies Inc.'s ManTrap computer security software. Specifications; Capabilities; Applications; Contact information.

  • DNA tech proves match for cybercrime. Wagner, Siobhan // Engineer (00137758);11/29/2010, Vol. 295 Issue 7807, p9 

    The article reports on the funding received by the Inquisitive Systems to market the anti-cybercrime software which is based from the same algorithms of a DNA sequence analysis.

  • Is Your Library Immunized? Bobicki, Jeff // Library Journal;Winter2000 Net Connect, Vol. 125 Issue 1, p6 

    Offers information to librarians about computer viruses. Examples of the ways in which viruses enter the computer systems; How libraries need to be proactive to avoid highly-destructive viruses; Infrequency of successful virus with catastrophic consequences; Techniques used such as antivirus...

  • Cybersecurity Trends: Advanced Threat Detection. Shenoy, Rekha // Siliconindia;Feb2015, Vol. 18 Issue 2, p28 

    The article focuses on the trend of cybersecurity in the detection of cyber crimes. Topics discussed include the development of trends in cybersecurity defense such as the malware names and hashes and attack vectors, the application of threat intelligence to adapt changes in the cyberthreat...

  • Breaches. Lindenmayer, Isabelle // American Banker;12/23/2005, Vol. 170 Issue 245, p3 

    This article reports on Guidance Software Inc. revealing that hackers had accessed credit card data on 3,800 of its customers. Most of Guidance's customers are law enforcement and security professionals. The date included names, addresses, and verification codes printed on the backs of credit...

  • EXTENDIENDO EL MODELO e-SCARF DE DETECCIÓN DE FRAUDE EN SISTEMAS DE COMERCIO ELECTRÓNICO. Arias, Francisco; Cerpa, Narciso // INGENIARE - Revista Chilena de Ingeniería;Jul-Sep2008, Vol. 16 Issue 3, p282 

    In this work we extend a fraud detection model, called SCARF, which is based on a concurrent auditing technique that consists of inserting auditing procedures within an application program; in this case, an electronic commerce system. These procedures undertake the capture of electronic...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics