In a paper of four pages, the writer looks at computer security. Honeypots are examined as an example. Paper uses six sources.