[ a / m / major / minor ]


art




Posting mode: Reply

[Return]
Name
E-mail
Subject
Comment
*Write the result of 3 plus 3
File
Password (Password used for file deletion)
  • Supported file types are: GIF, JPG, PNG
  • Maximum file size allowed is 2048 KB.
  • Images greater than 250x250 pixels will be thumbnailed.
  • Tripcodes, noko and sage are working. Secure tripcodes aren't.
  • Neither password & edit/deletor.
  • Currently there are 336 unique user posts.






  • File: 201.jpg -(55673 B, 480x640) Thumbnail displayed, click image for full size.
    Anonymous 2011-09-26 09:26:09 No. 65

    Security through obscurity never really worked.

    >A system relying on security through obscurity may have theoretical or actual security vulnerabilities, but its owners or designers believe that the flaws are not known, and that attackers are unlikely to find them. A system may use security through obscurity as a defense in depth measure; while all known security vulnerabilities would be mitigated through other measures, public disclosure of products and versions in use makes them early targets for newly discovered vulnerabilities in those products and versions. An attacker's first step is usually information gathering; this step is delayed by security through obscurity. The technique stands in contrast with security by design and open security, although many real-world projects include elements of all strategies.

    So, lets fortify this Temple.


    Anonymous 2012-08-17 23:47:20 No. 117

    >>65
    Jelly interesting, ya?
    I just happened to have finished reading my IT class on the Principles of Information Security.
    Give me a few weeks to let this stew my brain meats for awhile and I will do my best to help out.
    Mine AIM is Totensoldat