Amen brother, been there, when it first came around , learned off source code 
PLMs

Sent from my iPad
Scott Ford
Senior Systems Engineer
www.identityforge.com



On Mar 3, 2012, at 9:55 AM, "Pate, Gene" <[email protected]> wrote:

> On Mar 2, 2012, at 05:38, Peter Relson wrote:
>
>>> This runs afoul of IBM's practice of "security through obscurity"
>>
>> That's not a practice or policy of which I am aware. Quite the opposite.
>>
>
> Perhaps you have heard of it by IBM official name for "security through 
> Obscurity":  Object Code Only
>
> Does that name ring any bells?
>
> If not you might recognize the technique used, document only what you want 
> them to know and then do not allow them to see the OS source code so that 
> they cannot exploit or APAR the security holes that remain.
>
> A nice trick if you can pull it off but one that is not available on systems 
> running LINUX, for the most part anyway.
>
> Gene Pate
> CSX Technology
> Enterprise Architecture
>
> -----------------------------------------
> This email transmission and any accompanying attachments may
> contain CSX privileged and confidential information intended only
> for the use of the intended addressee.  Any dissemination,
> distribution, copying or action taken in reliance on the contents
> of this email by anyone other than the intended recipient is
> strictly prohibited.  If you have received this email in error
> please immediately delete it and  notify sender at the above CSX
> email address.  Sender and CSX accept no liability for any damage
> caused directly or indirectly by receipt of this email.

Reply via email to