Amen brother, been there, when it first came around , learned off source code PLMs
Sent from my iPad Scott Ford Senior Systems Engineer www.identityforge.com On Mar 3, 2012, at 9:55 AM, "Pate, Gene" <[email protected]> wrote: > On Mar 2, 2012, at 05:38, Peter Relson wrote: > >>> This runs afoul of IBM's practice of "security through obscurity" >> >> That's not a practice or policy of which I am aware. Quite the opposite. >> > > Perhaps you have heard of it by IBM official name for "security through > Obscurity": Object Code Only > > Does that name ring any bells? > > If not you might recognize the technique used, document only what you want > them to know and then do not allow them to see the OS source code so that > they cannot exploit or APAR the security holes that remain. > > A nice trick if you can pull it off but one that is not available on systems > running LINUX, for the most part anyway. > > Gene Pate > CSX Technology > Enterprise Architecture > > ----------------------------------------- > This email transmission and any accompanying attachments may > contain CSX privileged and confidential information intended only > for the use of the intended addressee. Any dissemination, > distribution, copying or action taken in reliance on the contents > of this email by anyone other than the intended recipient is > strictly prohibited. If you have received this email in error > please immediately delete it and notify sender at the above CSX > email address. Sender and CSX accept no liability for any damage > caused directly or indirectly by receipt of this email.
