But I was wondering , has anyone set-up a machine already as bate ?
Of course, for example see http://www.honeynet.org/ .
I'm very curious what this hacker wants to do with this compromised machine :)
Most common uses:
* Sending spam * DDoS attack zombie * Pirate software repository * Server for phishing schemes * Laundering other malicious activity * Showing off to cracker friends
--Stewart