On Mar 2, 2012, at 05:38, Peter Relson wrote: >> This runs afoul of IBM's practice of "security through obscurity" > > That's not a practice or policy of which I am aware. Quite the opposite. >
Perhaps you have heard of it by IBM official name for "security through Obscurity": Object Code Only Does that name ring any bells? If not you might recognize the technique used, document only what you want them to know and then do not allow them to see the OS source code so that they cannot exploit or APAR the security holes that remain. A nice trick if you can pull it off but one that is not available on systems running LINUX, for the most part anyway. Gene Pate CSX Technology Enterprise Architecture ----------------------------------------- This email transmission and any accompanying attachments may contain CSX privileged and confidential information intended only for the use of the intended addressee. Any dissemination, distribution, copying or action taken in reliance on the contents of this email by anyone other than the intended recipient is strictly prohibited. If you have received this email in error please immediately delete it and notify sender at the above CSX email address. Sender and CSX accept no liability for any damage caused directly or indirectly by receipt of this email.
