Differences between version 2 and previous revision of SecurityByObscurity.
Other diffs: Previous Major Revision, Previous Author, or view the Annotated Edit History
Newer page: | version 2 | Last edited on Friday, August 1, 2003 4:43:40 am | by AristotlePagaltzis | Revert |
Older page: | version 1 | Last edited on Friday, August 1, 2003 12:16:07 am | by BlairHarrison | Revert |
@@ -1,7 +1,6 @@
-An umbrella name for a number of methods of "securing" a system. Generally
not as good as real
security, but possibly good enough
to deter your average user attempting
to exploit a system
.
+This is
not security at all. However
, it may protect you from casual attacks from the uninitiated. The aim is
to making (potential) security holes hard
to find, while they still exist
. Common approaches include
-Such methods can include:
-
-
*Using different names for the superuser accounts, such as bob, rather than "root" or "administrator"
-*Using
obscure old versions
of software that exploits are not readily available for
-*Running internet-accessible services on old systems which nobody pays
much attention to, such as an old Mac or Amiga
.
+* Using different names for the superuser accounts, such as bob, rather than "root" or "administrator"
+* Running daemons on non-standard ports.
+* Running
obscure variants
of software or hardware
that exploits are not readily available for and are not paid
much attention to.
+* Keeping source code closed and only distributing binaries of software
.