Penguin
Note: You are viewing an old revision of this page. View the current version.

This is not security at all. However, it may protect you from casual attacks from the uninitiated. The aim is to making (potential) security holes hard to find, while they still exist. Common approaches include

  • Using different names for the SuperUser accounts, such as bob, rather than "root" or "administrator"
  • Running daemons on non-standard ports.
  • Running obscure variants of software or hardware which neither exploits are readily available for nor much attention is paid to.
  • Distributing software as BinaryExecutables, keeping source code closed so that it cannot easily be examined for weaknesses.