On Mar 2, 2012, at 05:38, Peter Relson wrote:

>> This runs afoul of IBM's practice of "security through obscurity"
>
> That's not a practice or policy of which I am aware. Quite the opposite.
>

Perhaps you have heard of it by IBM official name for "security through 
Obscurity":  Object Code Only

Does that name ring any bells?

If not you might recognize the technique used, document only what you want them 
to know and then do not allow them to see the OS source code so that they 
cannot exploit or APAR the security holes that remain.

A nice trick if you can pull it off but one that is not available on systems 
running LINUX, for the most part anyway.

Gene Pate
CSX Technology
Enterprise Architecture

-----------------------------------------
This email transmission and any accompanying attachments may
contain CSX privileged and confidential information intended only
for the use of the intended addressee.  Any dissemination,
distribution, copying or action taken in reliance on the contents
of this email by anyone other than the intended recipient is
strictly prohibited.  If you have received this email in error
please immediately delete it and  notify sender at the above CSX
email address.  Sender and CSX accept no liability for any damage
caused directly or indirectly by receipt of this email.

Reply via email to