Third, there is the risk of disabling Honeynet functionality.
第三, 你还要冒着蜜网某些功能失效的危险.
互联网
This is the technology we choose to initially deploy when we first set up our honeynet.
这是我们在初次建立蜜网时所选用的技术.
互联网
Attackers may attempt criminal activity from your compromised Honeynet without actually attacking anyone outside your Honeynet.
攻击者可能从被攻陷的你的蜜网上尝试一些不用实际的攻击外部系统的犯罪行为.
互联网