摘要 |
A system, method, and computer software for controlling access to computer systems by third parties such as hackers. Software (402) detects attempeted accesses to ports of open server processes on a computer (400) and redirects such attempted accesses, preferably transparently. The hacker may be redirected to a honeypot server (406) arranged to resemble the target computer, to deceive the hacker into thinking the attempted access was successful. The software improves computer security and can assist in monitoring and trapping hackers.
|