Interested in capturing, documenting and analyzing scans and malicious activity, Corelan Team decided to set up a honeypot and put it online. In the first week of december 2010, Obzy built a machine (default Windows XP SP3 installation, no patches, firewall turned off), named it “EGYPTS-AIRWAYS”, set up a honeypot + some other monitoring tools, and connected it to the internet.
After working a couple of weeks on the POP3 Collector, I’m happy to anounce the general availability of v1.2 of the free PVE POP3 Collector. The new version can be downloaded from this link. The new version starts at 220.127.116.110, because of a bug in the 1.1 branch update-check routines. New features in this version […]