Hacking blocker loaded firewall trap trick list


To prevent hackers for breaking into a system why not just have a list of names or a list of information that is there as a decoy and can act as a alternate route for anyone hacking intothe system automatically be deployed to or deferred to or detoured to this fake list of names can then alert the operator or owner that someone is hacking in a plug hacking into the system after a reasonable amount of packing a decoy that alerts the operator to the hacker traces the protocol used traces the origin deploys perhaps A virus or Trojan horse to the hacker that is disabled by personnel who would visit the home or place of origin and confiscate the equipment

Advertisements

About garyskeete

ASHWORTH MEDICINE-Professional Medical Assisting, Doctor of Science,Legal Assistant Diploma BSc Criminal Justice
This entry was posted in Uncategorized. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s