Oct 04, 2011 at 10:29PM EDT
This is what’s known in the world of internet security as a “Honey-pot”.
The term is taken from honeypots or fly paper which used the sweet scent of honey to lure flies to their untimely demise.
A honey pot can be created by a security firm, law enforcement, research firm, or business entity. It’s basically used to see how the hackers initiated the attack, and gather research on how to stop it and possibly those who started it..
Counter hacking, pure and simple. If you find this a somewhat dubious Anon-op, it’s best not to go through with using either ref ref or LOIC. Remember, the best way to avoid arrest is to never commit a crime in the first place.
Cheezburger Blog Advertising Developers Jobs Contact Us
Sign up Now!