Penguin
Diff: SecurityByObscurity
EditPageHistoryDiffInfoLikePages

Differences between version 2 and previous revision of SecurityByObscurity.

Other diffs: Previous Major Revision, Previous Author, or view the Annotated Edit History

Newer page: version 2 Last edited on Friday, August 1, 2003 4:43:40 am by AristotlePagaltzis Revert
Older page: version 1 Last edited on Friday, August 1, 2003 12:16:07 am by BlairHarrison Revert
@@ -1,7 +1,6 @@
-An umbrella name for a number of methods of "securing" a system. Generally not as good as real security, but possibly good enough to deter your average user attempting to exploit a system
+This is not security at all. However , it may protect you from casual attacks from the uninitiated. The aim is to making (potential) security holes hard to find, while they still exist . Common approaches include  
  
-Such methods can include:  
-  
- *Using different names for the superuser accounts, such as bob, rather than "root" or "administrator"  
-*Using obscure old versions of software that exploits are not readily available for  
-*Running internet-accessible services on old systems which nobody pays much attention to, such as an old Mac or Amiga
+* Using different names for the superuser accounts, such as bob, rather than "root" or "administrator"  
+* Running daemons on non-standard ports.  
+* Running obscure variants of software or hardware that exploits are not readily available for and are not paid much attention to.  
+* Keeping source code closed and only distributing binaries of software