Product Overview
* Talks about hardening a Windows host before deploying Honeypot
* Covers how to create your own emulated services to fool hackers
* Discusses physical setup of Honeypot and network necessary to draw hackers to Honeypot
* Discusses how to use Snort to co-exist with Honeypot
* Discusses how to use a Unix-style Honeypot to mimic a Windows host
* Discusses how to fine-tune a Honeypot
* Discusses OS fingerprinting, ARP tricks, packet sniffing, and exploit signatures