0c4add2ee8
- remove non-existant flavors in DESCR . - bump PKGNAME . discussed with Rui Reis and jolan@
5 lines
224 B
Plaintext
5 lines
224 B
Plaintext
Nepenthes can determine the malware activity on a network
|
|
by deploying a nepenthes sensor (i.e. honeypot). The programm
|
|
emulates different well known vulnerabilities waiting for
|
|
malicious connections trying to exploit them.
|