Act as a honeypot to attract and detect hackers and worms by simulating vulnerable system services and Trojans.