While looking around my blog, I noticed I had a post in draft form from last November. oops. Anyway, here it is.
While I was fumbling along last night on the internet, I ran across a comuter security website. One article in particular is about a honeypot that BBC had connected to the internet. A 'honeypot looks like a normal computer but in reality it has been tweaked to allow every action to be logged so security experts can analyze the perpetraiter be he man or script. The first paragraph of the article can tell you more about honeypots and how they work. Then the article went on to describe several of the attacks, and what they did to the honeypot computer. This is definitely worth a read.