{"id":21102,"date":"2020-06-18T09:14:02","date_gmt":"2020-06-18T09:14:02","guid":{"rendered":"https:\/\/lmtech.asia\/lmt\/?p=21102"},"modified":"2020-07-08T06:33:27","modified_gmt":"2020-07-08T06:33:27","slug":"honeypot","status":"publish","type":"post","link":"https:\/\/lmtech.asia\/lmt\/honeypot\/","title":{"rendered":"Honeypot"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Honeypot \u1006\u102d\u102f\u1010\u102c \u101c\u103d\u101a\u103a\u101c\u103d\u101a\u103a\u1015\u103c\u1031\u102c\u101b\u101b\u1004\u103a\u1010\u1031\u102c\u1037 decoy system \u1011\u1031\u102c\u1004\u103a\u1001\u103b\u1031\u102c\u1000\u103a\u1010\u1005\u103a\u1001\u102f\u1015\u1032\u104b Production System \u1000\u102d\u102f replicate \u101c\u102f\u1015\u103a\u1011\u102c\u1038\u1010\u1032\u1037 fake system \u1010\u1005\u103a\u1001\u102f\u1016\u1014\u103a\u1010\u102e\u1038\u1011\u102c\u1038\u1010\u101a\u103a\u104b Hacker \u1000 \u101c\u102c hack\u1015\u103c\u102e\u1006\u102d\u102f\u1010\u102c\u1014\u1032\u1037 production \u1011\u1032 \u1019\u101d\u1004\u103a\u101e\u103d\u102c\u1038\u1018\u1032 Honeypot \u1011\u1032\u101d\u1004\u103a\u101c\u102c\u1010\u101a\u103a\u104b Hacker \u1000 Honeypot \u1011\u1032\u101b\u1031\u102c\u1000\u103a\u101c\u102c\u1015\u103c\u102e\u1006\u102d\u102f\u1010\u102c\u1014\u1032\u1037 hacker activities \u1000\u102d\u102f learn \u101c\u102f\u1015\u103a\u1010\u101a\u103a\u104b Attacker \u1000\u102d\u102f \u1015\u103c\u1014\u103a\u1015\u103c\u102e\u1038 attack \u101c\u102f\u1015\u103a\u1010\u1032\u1037 system \u1010\u1005\u103a\u1001\u102f\u1015\u1032\u104b<\/span><\/p>\n<p><b>Malware \u1010\u103d\u1031\u1021\u1000\u103c\u1031\u102c\u1004\u103a\u1038<\/b><\/p>\n<ol>\n<li><span style=\"font-weight: 400;\">Virus<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Virus \u101c\u102d\u102f\u1037\u1015\u103c\u1031\u102c\u101c\u102d\u102f\u1000\u103a\u1010\u102c\u1014\u1032\u1037 \u101c\u1030\u1010\u102d\u102f\u1004\u103a\u1038\u101e\u102d\u1019\u103e\u102c\u1015\u102b\u104b \u1000\u1019\u1039\u1018\u102c\u1037\u1015\u1011\u1019\u1006\u102f\u1036\u1038 virus \u1000\u1010\u1031\u102c\u1037 The Brain \u101c\u102d\u102f\u1037 \u1014\u102c\u1019\u100a\u103a\u101b\u1010\u101a\u103a\u104b \u1021\u1032\u1037\u1014\u1031\u102c\u1000\u103a\u1019\u103e\u102c Mr. Fred Cohem \u1000\u1014\u1031 Virus \u1006\u102d\u102f\u1015\u103c\u102e\u1038 \u1014\u102c\u1019\u100a\u103a\u1015\u1031\u1038\u1001\u1032\u1037\u1010\u101a\u103a\u104b \u101e\u1030\u1037\u101b\u1032\u1037 \u101c\u102f\u1015\u103a\u1006\u1031\u102c\u1004\u103a\u1001\u103b\u1000\u103a\u101c\u1031\u1038\u1010\u103d\u1031\u1015\u1032 highlight \u1011\u102c\u1038\u1015\u103c\u102e\u1038 \u1015\u103c\u1031\u102c\u101c\u102d\u102f\u1000\u103a\u1015\u102b\u1037\u1019\u101a\u103a\u104b Virus \u101b\u1032\u1037 main purpose \u1000 important data \u1010\u103d\u1031\u1000\u102d\u102f delete \u101c\u102f\u1015\u103a\u1010\u101a\u103a\u104b Virus \u1000\u101e\u1030\u1000\u102d\u102f\u101a\u103a\u1010\u102d\u102f\u1004\u103a\u1010\u1031\u102c\u1037 replicate \u1019\u101c\u102f\u1015\u103a\u1014\u102d\u102f\u1004\u103a\u1018\u1030\u1038\u104b \u1006\u102d\u102f\u101c\u102d\u102f\u1010\u102c\u1000 \u1005\u1000\u103a\u1010\u1005\u103a\u1001\u102f\u1000\u102d\u102f virus \u101d\u1004\u103a\u1010\u102c\u1014\u1032\u1037 \u101e\u1030\u1000\u102d\u102f\u101a\u103a\u1010\u102d\u102f\u1004\u103a \u1019 run \u1014\u102d\u102f\u1004\u103a\u1018\u1030\u1038\u104b Host file \u1010\u1005\u103a\u1001\u102f\u101c\u102d\u102f\u1010\u101a\u103a\u104b \u1005\u1000\u103a\u1011\u1032\u1019\u103e\u102c\u101b\u103e\u102d\u1010\u1032\u1037 file \u1010\u1005\u103a\u1001\u102f\u1019\u103e\u102c \u1000\u1015\u103a\u1014\u1031\u1010\u101a\u103a\u104b \u1021\u1032\u1037 file run \u101c\u102d\u102f\u1000\u103a\u1019\u103e\u102c virus \u1000 \u1005 run \u1010\u101a\u103a\u104b \u1009\u1015\u1019\u102c &#8211; \u1005\u1000\u103a\u1010\u1005\u103a\u1001\u102f\u1000\u102d\u102f virus \u101d\u1004\u103a\u101c\u102c\u1010\u101a\u103a\u104b \u1021\u1032\u1037 virus \u1000 Note pad file\u1019\u103e\u102c \u1000\u1015\u103a\u1014\u1031\u1010\u101a\u103a\u104b \u1021\u1032\u1037 notepad file run \u101c\u102d\u102f\u1000\u103a\u1015\u103c\u102e\u1006\u102d\u102f\u1019\u103e\u102c \u1021\u1032\u1037 virus \u1000 \u1005 run \u1010\u101a\u103a\u104b<\/span><\/p>\n<ol start=\"2\">\n<li><span style=\"font-weight: 400;\">Worm\u00a0<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Worm \u1000\u1010\u1031\u102c\u1037 self replicate \u101c\u102f\u1015\u103a\u1014\u102d\u102f\u1004\u103a\u1010\u101a\u103a\u104b \u1005\u1000\u103a\u1010\u1005\u103a\u1001\u102f\u1011\u1032\u1000\u102d\u102f \u101d\u1004\u103a\u101c\u102d\u102f\u1000\u103a\u1015\u103c\u102e\u1006\u102d\u102f\u1010\u102c\u1014\u1032\u1037 whole network \u101c\u102f\u1036\u1038\u1011\u102d\u1000\u102d\u102f spread \u101c\u102f\u1015\u103a\u1014\u102d\u102f\u1004\u103a\u1010\u101a\u103a\u104b Worm attack \u101d\u1004\u103a\u101b\u1004\u103a performance hit \u1016\u103c\u1005\u103a\u1014\u102d\u102f\u1004\u103a\u1010\u101a\u103a\u104b \u1010\u1001\u102b\u1010\u1001\u102b \u1005\u1000\u103a\u1010\u103d\u1031\u101c\u1031\u1038\u101c\u102c\u1010\u101a\u103a\u1006\u102d\u102f\u1010\u102c\u1019\u103b\u102d\u102f\u1038\u1006\u102d\u102f worm attack \u101d\u1004\u103a\u101c\u102c\u1010\u102c\u1019\u103b\u102d\u102f\u1038\u101c\u1032\u1016\u103c\u1005\u103a\u1014\u102d\u102f\u1004\u103a\u1010\u101a\u103a\u1015\u1031\u102b\u1037\u104b<\/span><\/p>\n<ol start=\"3\">\n<li><span style=\"font-weight: 400;\">Trojan<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Trojan horse \u101c\u102d\u102f\u1037\u1010\u1031\u102c\u1037\u1001\u1031\u102b\u103a\u1000\u103c\u1010\u101a\u103a\u104b \u101e\u1030\u1000 legitimate form \u101c\u102d\u102f program \u1010\u1005\u103a\u1001\u102f\u1006\u103d\u1032\u101c\u102d\u102f\u1000\u103a\u1010\u101a\u103a\u104b \u1009\u1015\u1019\u102c\u1015\u103c\u1031\u102c\u101b\u101b\u1004\u103a\u1010\u1031\u102c\u1037 facebook \u101b\u103e\u102d\u1019\u101a\u103a\u104b Facebook \u1000\u1010\u1031\u102c\u1037 real program \u1010\u1005\u103a\u1001\u102f\u1015\u1031\u102b\u1037\u104b Facebook \u101b\u1032\u1037 background \u1019\u103e\u102c Wrapper \u101c\u102d\u102f\u1019\u103b\u102d\u102f\u1038\u1014\u1032\u1037 trojan \u1000\u102d\u102f\u1015\u1031\u102b\u1004\u103a\u1038\u1011\u100a\u1037\u103a\u101c\u102d\u102f\u1000\u103a\u1010\u101a\u103a\u104b Victim \u1019\u103c\u1004\u103a\u1014\u1031\u101b\u1010\u102c\u1010\u1031\u102c\u1037 \u1010\u1000\u101a\u1037\u103a facebook \u101c\u102d\u102f\u1019\u103b\u102d\u102f\u1038\u1015\u1032\u1015\u1031\u102b\u1037\u1014\u1031\u102c\u103a\u104b \u1012\u102b\u1015\u1031\u1019\u101a\u1037\u103a \u1014\u1031\u102c\u1000\u103a\u1019\u103e\u102c trojan \u1015\u102b\u1015\u102b\u1014\u1031\u1010\u101a\u103a\u104b \u1021\u1032\u1037 program \u1000\u102d\u102f victim \u1000 execute \u101c\u102f\u1015\u103a\u101c\u102d\u102f\u1000\u103a\u1010\u102c\u1014\u1032\u1037 trojan \u1015\u102b run \u1019\u102d\u101e\u103d\u102c\u1038\u1010\u101a\u103a\u104b \u1021\u1032\u1037\u101c\u102d\u102f\u1019\u103b\u102d\u102f\u1038\u1006\u102d\u102f Hacker \u1000\u1010\u1031\u102c\u1037 victim account \u1010\u1005\u103a\u1001\u102f\u101c\u102f\u1036\u1038\u1000\u102d\u102f control \u101c\u102f\u1015\u103a\u101c\u102d\u102f\u1037\u101b\u101e\u103d\u102c\u1038\u1015\u103c\u102e\u104b<\/span><\/p>\n<ol start=\"4\">\n<li><span style=\"font-weight: 400;\">Logic Bomb<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Logic Bomb \u1000 surprise \u101c\u102f\u1015\u103a\u1010\u1032\u1037 attack \u1010\u1005\u103a\u1001\u102f\u101c\u102d\u102f\u1015\u1032\u1006\u102d\u102f\u101b\u1019\u103e\u102c\u1015\u1031\u102b\u1037\u104b virus \u1000\u1001\u103b\u1000\u103a\u1001\u103b\u1004\u103a\u1038 \u1019 run\u101e\u1031\u1038\u1018\u1030\u1038\u104b Schedule \u1001\u103b\u1011\u102c\u1038\u1010\u101a\u103a\u104b \u1009\u1015\u1019\u102c &#8211; \u1021\u1001\u102b\u1000\u103c\u102e\u1038\u101b\u1000\u103a\u1000\u103c\u102e\u1038\u1010\u103d\u1031\u101c\u102d\u102f\u104a \u1015\u1031\u102b\u103a\u1015\u103b\u1030\u1010\u102c\u1016\u103c\u1005\u103a\u1010\u1032\u1037\u1014\u1031\u1037\u1010\u103d\u1031\u104a \u1021\u1019\u103e\u1010\u103a\u1010\u101b\u1016\u103c\u1005\u103a\u1005\u1031\u1019\u101a\u1037\u103a\u1014\u1031\u1037\u1010\u103d\u1031\u1019\u103e\u102c schedule\u1001\u103b\u1015\u103c\u102e\u1038 \u1021\u1032\u1037\u1001\u103b\u102d\u1014\u103a\u1019\u103e \u1011\u1016\u103c\u1005\u103a\u1010\u102c\u1019\u103b\u102d\u102f\u1038\u1015\u102b\u104b<\/span><\/p>\n<ol start=\"5\">\n<li><span style=\"font-weight: 400;\">Adware<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Adware \u1000 Advertising ware\u1016\u103c\u1005\u103a\u1010\u101a\u103a\u104b \u1009\u1015\u1019\u102c &#8211; website \u1011\u1032\u101d\u1004\u103a\u1010\u102c\u1014\u1032\u1037 MPT \u1010\u102d\u102f\u1037 Orredoo\u1010\u102d\u102f\u1037 \u1005\u101e\u100a\u1037\u103a \u1000\u103c\u1031\u102c\u103a\u1004\u103c\u102c\u1010\u103d\u1031\u1010\u1000\u103a\u101c\u102c\u1010\u101a\u103a\u104b \u1021\u1032\u1037\u1012\u102b\u1010\u103d\u1031\u1000 Adware \u1010\u103d\u1031\u1015\u1031\u102b\u1037\u1014\u1031\u102c\u103a\u104b \u1012\u102b\u1015\u1031\u1019\u101a\u1037\u103a \u101e\u1030\u1010\u102d\u102f\u1037\u1000 legal \u1016\u103c\u1005\u103a\u1010\u101a\u103a\u104b Illegal \u1016\u103c\u1005\u103a\u1010\u1032\u1037 Adware \u1010\u103d\u1031\u1000\u1000\u103c \u1010\u1031\u102c\u1037\u101e\u1000\u103a\u101e\u1000\u103a\u101b\u103e\u102d\u1010\u101a\u103a\u104b \u1010\u1001\u102b\u1010\u101c\u1031 \u1000\u103b\u103d\u1014\u103a\u1010\u1031\u102c\u103a\u1010\u102d\u102f\u1037\u00a0 website link \u1010\u103d\u1031\u101d\u1004\u103a\u1010\u1032\u1037\u1021\u1001\u102b \u101d\u1004\u103a\u1010\u1032\u1037\u1021\u1001\u102b website\u1011\u1032\u1000\u102d\u102f\u1019\u101b\u1031\u102c\u1000\u103a\u101e\u103d\u102c\u1038\u1018\u1032 \u201cYou are very lucky person\u201d \u2026\u1005\u101e\u100a\u103a\u1016\u103c\u1004\u1037\u103a box \u1000\u103b\u101c\u102c\u1015\u103c\u102e\u1038 \u1000\u1036\u1005\u1019\u103a\u1038\u1019\u1032\u1014\u103e\u102d\u102f\u1000\u103a\u1001\u102d\u102f\u1004\u103a\u1038\u1010\u102c\u1010\u102d\u102f\u1037 \u1000\u103c\u102f\u1036\u1016\u1030\u1038\u1000\u103c\u1019\u103e\u102c\u1015\u102b\u104b \u1021\u1032\u1037\u101c\u102d\u102f\u1019\u103b\u102d\u102f\u1038 \u1010\u103d\u1031\u1000\u102d\u102f Adware \u101c\u102d\u102f\u1037\u1001\u1031\u102b\u103a\u1010\u102c\u1015\u102b\u104b Illegal program \u1010\u103d\u1031\u1015\u1031\u102b\u1037\u104b Background \u1019\u103e\u102c Trojan \u1014\u1032\u1037\u1015\u1031\u102b\u1004\u103a\u1038\u1015\u103c\u102e\u1038 Victim \u1000 box \u1011\u1032\u1000\u1018\u101a\u103a buttom \u1000\u102d\u102f\u1015\u1032 \u1014\u103e\u102d\u1015\u103a\u1014\u103e\u102d\u1015\u103a Trojan \u1000\u102d\u102f auto download \u1006\u103d\u1032\u1015\u103c\u102e\u1038\u101e\u102c\u1038\u1016\u103c\u1005\u103a\u101e\u103d\u102c\u1038\u1015\u103c\u102e\u1038 victim \u101b\u1032\u1037 \u1005\u1000\u103a\u1010\u1005\u103a\u1001\u102f\u101c\u102f\u1036\u1038\u1000\u102d\u102f hack \u1001\u1036\u101c\u102d\u102f\u1000\u103a\u101b\u1019\u103e\u102c\u1015\u102b\u104b \u1012\u102b\u1019\u103b\u102d\u102f\u1038\u1000\u102d\u102f Adware \u101c\u102d\u102f\u1037\u1001\u1031\u102b\u103a\u1015\u102b\u1010\u101a\u103a\u104b<\/span><\/p>\n<ol start=\"6\">\n<li><span style=\"font-weight: 400;\">Spyware<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Spyware \u1006\u102d\u102f\u1010\u102c\u101c\u1032 illegal program \u1010\u1005\u103a\u1001\u102f\u1016\u103c\u1005\u103a\u1015\u103c\u102e\u1038 victim \u101b\u1032\u1037 activities \u1010\u103d\u1031\u1000\u102d\u102f monitor \u101c\u102f\u1015\u103a\u1015\u103c\u102e\u1038 information \u1010\u103d\u1031\u1021\u1000\u102f\u1014\u103a\u101c\u102f\u1036\u1038\u1000\u102d\u102f acttacker \u1010\u103d\u1031\u1000\u102d\u102f\u1015\u103c\u1014\u103a\u1015\u102d\u102f\u1037\u1015\u1031\u1038\u1010\u101a\u103a\u104b Spyware \u101c\u1032 background \u1019\u103e\u102c\u1015\u1032 run \u1014\u1031\u1010\u102c\u1019\u103b\u102d\u102f\u1038\u1016\u103c\u1005\u103a\u1015\u103c\u102e\u1038 \u1000\u102d\u102f\u101a\u1037\u103a hack\u1001\u103b\u1004\u103a\u1010\u1032\u1037 \u1005\u1000\u103a\u1019\u103e\u102c install \u101c\u102f\u1015\u103a\u101b\u1010\u101a\u103a\u104b<\/span><\/p>\n<ol start=\"7\">\n<li><span style=\"font-weight: 400;\">KeyLogger<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0KeyLogger \u1000 keyboard \u1011\u1032\u1000\u101b\u103e\u102d\u101e\u1019\u103b\u103e \u1000\u102d\u102f\u101a\u103a\u101b\u102d\u102f\u1000\u103a\u101e\u1019\u103b\u103e key \u1010\u103d\u1031\u1000\u102d\u102f record \u101c\u102f\u1015\u103a\u1015\u103c\u102e\u1038 hack \u1010\u1032\u1037 \u00a0 attack \u1010\u1005\u103a\u1001\u102f\u1015\u102b\u104b Software \u101b\u1031\u102c Hardware \u101b\u1031\u102c (\u1042) \u1019\u103b\u102d\u102f\u1038\u101c\u102f\u1036\u1038\u101b\u103e\u102d\u1010\u101a\u103a\u104b Trojan Keyboard \u1006\u102d\u102f\u1010\u102c\u101c\u1032\u101b\u103e\u102d\u1010\u101a\u103a\u104b \u1021\u1032\u1037\u1000\u1031\u102c\u1004\u103a\u1000 keyboard \u1011\u1032\u1019\u103e\u102c Trojan program \u1015\u102b\u1010\u1032\u1037 chip \u101c\u1031\u1038\u1011\u100a\u1037\u103a\u1011\u102c\u1038\u1015\u103c\u102e\u1038 victim \u101b\u1032\u1037 activities \u1010\u103d\u1031\u1000\u102d\u102f track \u101c\u102f\u1015\u103a\u1010\u101a\u103a\u104b \u1019\u102d\u1018\u1010\u103d\u1031\u1000 \u1000\u102d\u102f\u101a\u1037\u103a\u101e\u102c\u1038\u101e\u1019\u102e\u1038\u1000\u102d\u102f \u1018\u102c\u1010\u103d\u1031\u101c\u102f\u1015\u103a\u1014\u1031\u101c\u1032 track \u1001\u103b\u1004\u103a\u1010\u1032\u1037 \u1021\u1001\u102b\u1019\u103b\u102d\u102f\u1038\u1019\u103e\u102c\u101c\u1032 Trojan keyboard \u1010\u103d\u1031\u1000\u102d\u102f\u101e\u102f\u1036\u1038\u1010\u102c\u1010\u103d\u1031\u1037\u101b\u1010\u101a\u103a\u104b<\/span><\/p>\n<ol start=\"8\">\n<li><span style=\"font-weight: 400;\">APT (Advance Per Threat)<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">\u1012\u102e attack \u1000\u1010\u1031\u102c\u1037\u1021\u101b\u1019\u103a\u1038\u1014\u1000\u103a\u1014\u1032\u101e\u103d\u102c\u1038\u1015\u103c\u102e\u104bNever Seen Before Attack\u104b Hacker \u1010\u1005\u103a\u101a\u1031\u102c\u1000\u103a\u1011\u1032 \u1006\u1031\u102c\u1004\u103a\u101b\u103d\u1000\u103a\u101c\u102d\u102f\u1037\u1019\u101b\u1010\u1031\u102c\u1037\u1018\u1030\u1038\u104b Strong \u1016\u103c\u1005\u103a\u1010\u1032\u1037 team\u1010\u1005\u103a\u1001\u102f \u1000\u1031\u102c\u1004\u103a\u1038\u1000\u1031\u102c\u1004\u103a\u1038\u101b\u103e\u102d\u1019\u103e \u1021\u1004\u103a\u1021\u102c\u1038\u1010\u1031\u102c\u1004\u1037\u103a\u1019\u103e \u101c\u102f\u1015\u103a \u1006\u1031\u102c\u1004\u103a\u101c\u102d\u102f\u1037\u101b\u1010\u102c\u1019\u103b\u102d\u102f\u1038\u104b \u101e\u1030\u1037\u101b\u1032\u1037 \u1021\u1032\u1037\u1012\u102e\u1037\u1000 target \u1000\u101c\u1032 National Stated, government sector \u1010\u103d\u1031\u1000\u102d\u102f \u1009\u102e\u1038\u1010\u100a\u103a\u1010\u101a\u103a\u104b Fund \u101c\u1032\u1010\u1031\u102c\u1004\u1037\u103a\u1019\u103e \u1006\u1031\u102c\u1004\u103a\u101b\u103d\u1000\u103a\u101c\u102d\u102f\u1037\u101b\u1010\u101a\u103a\u104b\u00a0\u00a0\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<ol start=\"9\">\n<li><span style=\"font-weight: 400;\">Rootkit<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Rootkit \u101d\u1004\u103a\u1015\u103c\u102e\u1006\u102d\u102f\u101b\u1004\u103a OS \u101b\u1032\u1037 \u1021\u1019\u103c\u1004\u1037\u103a\u1006\u102f\u1036\u1038 kernel \u1021\u1011\u102d\u101d\u1004\u103a\u101e\u103d\u102c\u1038\u1010\u101a\u103a\u104b \u1015\u103c\u1014\u103a\u101b\u103e\u1004\u103a\u1038\u1016\u102d\u102f\u1037\u101c\u1032\u1019\u101c\u103d\u101a\u103a\u1018\u1030\u1038\u104b Rootkit \u101d\u1004\u103a\u1015\u103c\u102e\u1006\u102d\u102f\u101b\u1004\u103a\u1010\u1031\u102c\u1037 OS \u1010\u1005\u103a\u1001\u102f\u101c\u102f\u1036\u1038\u1000\u102d\u102f reinstall \u101c\u102f\u1015\u103a\u1010\u102c\u1021\u1000\u1031\u102c\u1004\u103a\u1038\u1006\u102f\u1036\u1038\u1015\u1032\u104b<\/span><\/p>\n<p>&nbsp;<\/p>\n<ol start=\"10\">\n<li><span style=\"font-weight: 400;\">Ransomware<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Ransanware \u1000\u1010\u1031\u102c\u1037 \u1021\u102c\u1038\u101c\u102f\u1036\u1038\u101e\u102d\u1010\u1032\u1037\u1021\u1010\u102d\u102f\u1004\u103a\u1038\u1015\u102b\u1015\u1032\u104b \u101c\u1000\u103a\u101b\u103e\u102d\u1019\u103e\u102c \u1001\u1031\u1010\u103a\u1021\u1005\u102c\u1038\u1006\u102f\u1036\u1038\u1016\u103c\u1005\u103a\u1014\u1031\u1010\u1032\u1037 attack \u1010\u1005\u103a\u1001\u102f\u1015\u1032\u104b Victim \u1006\u102e\u1000\u102d\u102f ransanware \u101d\u1004\u103a\u101e\u103d\u102c\u1038\u1015\u103c\u102e\u1006\u102d\u102f\u1010\u102c\u1014\u1032\u1037 victim\u101b\u1032\u1037\u1005\u1000\u103a\u1011\u1032\u1000 file \u1010\u103d\u1031\u1021\u1000\u102f\u1014\u103a\u101c\u102f\u1036\u1038\u1000\u102d\u102f browse \u101c\u102f\u1015\u103a\u1010\u101a\u103a\u104b \u1015\u103c\u102e\u1038\u101b\u1004\u103a file \u1010\u103d\u1031\u1000\u102d\u102f encrypt \u101c\u102f\u1015\u103a\u1015\u103c\u102e\u1038 \u1015\u102d\u102f\u1000\u103a\u1006\u1036\u1010\u1031\u102c\u1004\u103a\u1038\u1010\u101a\u103a\u104b \u1015\u102d\u102f\u1000\u103a\u1006\u1036\u101b\u1019\u103e key \u1015\u103c\u1014\u103a\u1001\u103b\u1015\u1031\u1038\u1010\u101a\u103a\u104b nomoreransom.org \u1006\u102d\u102f\u1010\u1032\u1037 website \u1019\u103e\u102c\u1010\u1031\u102c\u1037 key \u1010\u103d\u1031\u1010\u1004\u103a\u1015\u1031\u1038\u101c\u1031\u1037\u101b\u103e\u102d\u1010\u101a\u103a\u104b \u1021\u1032\u1037 website \u1019\u103e\u102c\u101c\u1032 \u1021\u1000\u1030\u100a\u102e\u1010\u1031\u102c\u1004\u103a\u1038\u101c\u102d\u102f\u1037\u101b\u1010\u101a\u103a\u104b<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Honeypot \u1006\u102d\u102f\u1010\u102c \u101c\u103d\u101a\u103a\u101c\u103d\u101a\u103a\u1015\u103c\u1031\u102c\u101b\u101b\u1004\u103a\u1010\u1031\u102c\u1037 decoy system \u1011\u1031\u102c\u1004\u103a\u1001\u103b\u1031\u102c\u1000\u103a\u1010\u1005\u103a\u1001\u102f\u1015\u1032\u104b Production System \u1000\u102d\u102f replicate \u101c\u102f\u1015\u103a\u1011\u102c\u1038\u1010\u1032\u1037 fake system \u1010\u1005\u103a\u1001\u102f\u1016\u1014\u103a\u1010\u102e\u1038\u1011\u102c\u1038\u1010\u101a\u103a\u104b Hacker \u1000 \u101c\u102c hack\u1015\u103c\u102e\u1006\u102d\u102f\u1010\u102c\u1014\u1032\u1037 production \u1011\u1032 \u1019\u101d\u1004\u103a\u101e\u103d\u102c\u1038\u1018\u1032 Honeypot \u1011\u1032\u101d\u1004\u103a\u101c\u102c\u1010\u101a\u103a\u104b Hacker \u1000 Honeypot \u1011\u1032\u101b\u1031\u102c\u1000\u103a\u101c\u102c\u1015\u103c\u102e\u1006\u102d\u102f\u1010\u102c\u1014\u1032\u1037 hacker activities \u1000\u102d\u102f learn \u101c\u102f\u1015\u103a\u1010\u101a\u103a\u104b Attacker \u1000\u102d\u102f \u1015\u103c\u1014\u103a\u1015\u103c\u102e\u1038 attack \u101c\u102f\u1015\u103a\u1010\u1032\u1037 system \u1010\u1005\u103a\u1001\u102f\u1015\u1032\u104b&#8230;&#8230;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":21190,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[83],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v14.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Honeypot - Legend Myanmar Technology<\/title>\n<meta name=\"robots\" content=\"index, follow\" \/>\n<meta name=\"googlebot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta name=\"bingbot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lmtech.asia\/lmt\/honeypot\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Honeypot - Legend Myanmar Technology\" \/>\n<meta property=\"og:description\" content=\"Honeypot \u1006\u102d\u102f\u1010\u102c \u101c\u103d\u101a\u103a\u101c\u103d\u101a\u103a\u1015\u103c\u1031\u102c\u101b\u101b\u1004\u103a\u1010\u1031\u102c\u1037 decoy system \u1011\u1031\u102c\u1004\u103a\u1001\u103b\u1031\u102c\u1000\u103a\u1010\u1005\u103a\u1001\u102f\u1015\u1032\u104b Production System \u1000\u102d\u102f replicate \u101c\u102f\u1015\u103a\u1011\u102c\u1038\u1010\u1032\u1037 fake system \u1010\u1005\u103a\u1001\u102f\u1016\u1014\u103a\u1010\u102e\u1038\u1011\u102c\u1038\u1010\u101a\u103a\u104b Hacker \u1000 \u101c\u102c hack\u1015\u103c\u102e\u1006\u102d\u102f\u1010\u102c\u1014\u1032\u1037 production \u1011\u1032 \u1019\u101d\u1004\u103a\u101e\u103d\u102c\u1038\u1018\u1032 Honeypot \u1011\u1032\u101d\u1004\u103a\u101c\u102c\u1010\u101a\u103a\u104b Hacker \u1000 Honeypot \u1011\u1032\u101b\u1031\u102c\u1000\u103a\u101c\u102c\u1015\u103c\u102e\u1006\u102d\u102f\u1010\u102c\u1014\u1032\u1037 hacker activities \u1000\u102d\u102f learn \u101c\u102f\u1015\u103a\u1010\u101a\u103a\u104b Attacker \u1000\u102d\u102f \u1015\u103c\u1014\u103a\u1015\u103c\u102e\u1038 attack \u101c\u102f\u1015\u103a\u1010\u1032\u1037 system \u1010\u1005\u103a\u1001\u102f\u1015\u1032\u104b.........\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lmtech.asia\/lmt\/honeypot\/\" \/>\n<meta property=\"og:site_name\" content=\"Legend Myanmar Technology\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-18T09:14:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-08T06:33:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lmtech.asia\/lmt\/wp-content\/uploads\/2020\/06\/Internet-Access-Management-7-1024x576-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lmtech.asia\/lmt\/#website\",\"url\":\"https:\/\/lmtech.asia\/lmt\/\",\"name\":\"Legend Myanmar Technology\",\"description\":\"LMT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/lmtech.asia\/lmt\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/lmtech.asia\/lmt\/honeypot\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/lmtech.asia\/lmt\/wp-content\/uploads\/2020\/06\/Internet-Access-Management-7-1024x576-1.png\",\"width\":1024,\"height\":576},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lmtech.asia\/lmt\/honeypot\/#webpage\",\"url\":\"https:\/\/lmtech.asia\/lmt\/honeypot\/\",\"name\":\"Honeypot - Legend Myanmar Technology\",\"isPartOf\":{\"@id\":\"https:\/\/lmtech.asia\/lmt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/lmtech.asia\/lmt\/honeypot\/#primaryimage\"},\"datePublished\":\"2020-06-18T09:14:02+00:00\",\"dateModified\":\"2020-07-08T06:33:27+00:00\",\"author\":{\"@id\":\"https:\/\/lmtech.asia\/lmt\/#\/schema\/person\/72cc066d8da28fb4d7b43f30d17971ad\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lmtech.asia\/lmt\/honeypot\/\"]}]},{\"@type\":[\"Person\"],\"@id\":\"https:\/\/lmtech.asia\/lmt\/#\/schema\/person\/72cc066d8da28fb4d7b43f30d17971ad\",\"name\":\"legend\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/lmtech.asia\/lmt\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/62dbac6f3bf15f4bac338d34b62deb21?s=96&d=mm&r=g\",\"caption\":\"legend\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/posts\/21102"}],"collection":[{"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/comments?post=21102"}],"version-history":[{"count":3,"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/posts\/21102\/revisions"}],"predecessor-version":[{"id":21106,"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/posts\/21102\/revisions\/21106"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/media\/21190"}],"wp:attachment":[{"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/media?parent=21102"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/categories?post=21102"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/tags?post=21102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}