When you set security barriers, most often your goal is to keep an intruder OUT of your stuff. Goldilocks is a system that allows you to set various levels of perceived access, giving you far more information on what the attacker intended had they been granted access. By spoofing common services, an attacker who believes they have gained access to your system, can be tracked as they issue dummy commands. Think of it as a managed honeypot for wargames or diagnostic security.
See project subfolders for various service implementations. Source to be posted in September 2008.
These details are provided for information only. No information here is legal advice and should not be used as such.