What account names are used in brute force attacks?
My son (who you may remember from our video on Operations Manager, Live Maps & Kinect) and I teamed up again recently to gather information on what accounts hackers are using when attempting to brute force attack systems. To do this we configured a honeypot server with the proper level of auditing, combined with a…