As the last decade has demonstrated the continued debate over the control of information has fostered a movement to place limitations within the access to network administrator tools. Such network intrusions undertaken by hacktivists have fostered the belief that both the tools and the knowledge should be limited. In this discussion we must come to discuss if such a tactic has any validity. As an expanded source of discussion we should discuss the growing use of Honey Pots.MUST BE IN APA FORMAT WITH ALL REFERENCES LISTEDMUST BE AT LEAST 100 WORDS