Penguin
Note: You are viewing an old revision of this page. View the current version.

This is not security at all. However, it may protect you from casual attacks from the uninitiated. The aim is to making (potential) security holes hard to find, while they still exist. Common approaches include

  • Using different names for the superuser accounts, such as bob, rather than "root" or "administrator"
  • Running daemons on non-standard ports.
  • Running obscure variants of software or hardware that exploits are not readily available for and are not paid much attention to.
  • Keeping source code closed and only distributing binaries of software.