You are viewing an old revision of this page.
An umbrella name for a number of methods of "securing" a system. Generally not as good as real security, but possibly good enough to deter your average user attempting to exploit a system.
Such methods can include:
- Using different names for the superuser accounts, such as bob, rather than "root" or "administrator"
- Using obscure old versions of software that exploits are not readily available for
- Running internet-accessible services on old systems which nobody pays much attention to, such as an old Mac or Amiga.