Hey there, does any one knows what exactly it works?
What i know about these are:
They creates virtual network to "trap" intrusions.
But i don't know how it works, how it's done, how to make it work, what do i need. eg. server?
because recently I kept getting intrusion attacks triggering on my firewall. so my friend suggested me using this.
Bookmarks