It lures intruder to attack themselves by constructing an obvious security vulnerability in its system, capture the activity data when intruder attacking on the honeypot system.
This prevents the most egregious types of attack, where an intruder can use the built in administrative infrastructure to deploy rogue applications onto your desktop.
这样可以防止最恶劣的攻击类型(入侵者可能使用内置管理基础设施来将恶意应用程序部署到您的桌面上)。
3
An even more subtle attack is that any page returned over HTTP can be potentially altered by an intruder — even URLs embedded in the page.