Bloomfield Hills, MI (PressExposure) October 29, 2009 -- As the computer repair center for Oakland, Wayne and Macomb Counties, Concise maintains a client list that resembles the âwhoâs whoâ in the Michigan small business community. They are good, and they are growing out of their digs in Bloomfield Hills.
One of the reasons that Concise is so well respected in their industry is because they take the time to explain and teach at the same time. Letâs face it, the information highway has its own language today. Computer techies have always had a vernacular that tended to exclude the rest of the non-techie world. Making things worse for us non-techies today, is the next layer of computer- speak: abbreviations of all the words that we had no clue about from the beginning.
The staff at Concise will now lead the pc tech support field by offering a series of articles with those definitions of words from the computer tech support world. This is the first offering in what Concise hopes will be a long series of definitions from the computer tech speaker.
Wikipedia defines a HONEYPOT in computer speak, as a trap set to detect, deflect, or in some manner counteract unauthorized attempts to obtain use of information systems.
A HONEYPOT consists of a computer, data, or a network site that appears to be part of a network. But, the Honeypot is actually an isolated and unprotected deadend which appears to a hacker as valuable information.
Simply put, a HONEYPOT is a seductive decoy. It lures the attacker into a harmless area of your system where it could be isolated, detected, and hopefully discovered by cyber police.
Another use of the Honeypot is to isolate spam. Spammers abuse vulnerable resources such as open mail relays. Some system administrators have created honeypot programs that masquerade as these decoy resources to discover spammer activity. There are several capabilities that honeypots provide to the administrators and the existence of such seductive bait systems makes abuse more difficult or risky for the spammer. Honeypots can be a powerful countermeasure to abuse from those who rely on very high volume abuse (e.g., spammers). These honeypots can reveal the apparent IP address of the abuse and provide bulk spam capture (which enables operators to determine spammer's URLs and response mechanisms).
Two or more honeypots on a network form a HONEYNET. Typically, a HONEYNET is used for monitoring a larger and/or more diverse network in which one honeypot may not be sufficient. Honeynets and honeypots are usually implemented as parts of a larger computer trouble shooting system. A HONEYFARM is a centralized collection of honeypots and analysis tools.
The next visit from a Concise Computer Consulting technician should go smoother. And, when the topic turns to setting up a Honeyfarm for your small businessâs computer system, you will immediately understand that you are not about to purchase a bunch of bee hives.
Concise Computer Consulting services the small and medium sized business community as well as residential homeowners. Concise offers every kind of on site computer service: laptop repair service, online pc repair, pc tech support and computer trouble shooting. Concise also offers Remote access configuration, Virtual Private Networks (VPN), Web site design, Server Administration, and Preventive maintenance in the metropolitan Detroit area. In addition, Concise diagnoses, installs, and manages both wired and wireless Local Area Networks, and even resells computers, laptops, and servers for Dell and IBM.
When you are experiencing computer problems, the time and money lost in productivity grows by the minute. Give us a call if you are having technology troubles and let us get you back up and running ...often within hours.
Jeff Atto of Concise Computer Consulting, LLC, located at 2150 Franklin Road, Bloomfield Hills, MI. Please contact us for any question about your home computer or laptop. 248-745-8255
This press release was submitted by Right Now Marketing Group, LLC.