Penguin
Note: You are viewing an old revision of this page. View the current version.

An umbrella name for a number of methods of "securing" a system. Generally not as good as real security, but possibly good enough to deter your average user attempting to exploit a system.

Such methods can include:

  • Using different names for the superuser accounts, such as bob, rather than "root" or "administrator"
  • Using obscure old versions of software that exploits are not readily available for
  • Running internet-accessible services on old systems which nobody pays much attention to, such as an old Mac or Amiga.