A honeypot is used in the area of computer and Internet security . It is a security resource, whose value lies in being probed, attacked or compromised. They are special decoy servers to catch the‚ Blackhats (people with evil and illegal intents). Honeypots attract the hackers to attack a vulnerable computer system, which is under observation, by a security team. All the information about the attackers is logged, and monitored.
Computer forensics involves the preservation, identification, extraction, documentation, and interpretation of computer media for evidentiary and/or root cause analysis. Computer forensics is simply the application of disciplined investigative techniques in the automated environment and the search, discovery, and analysis of potential evidence.
The architecture of Google search engine: You may like to read Introduction to search engines before we begin with this post. In Google Search engine, the web crawling is done by several distributed crawlers. There is a URL server that sends lists of URLs to be fetched to the crawlers. The web pages that are fetched are then… Read More »