Tag Archives: exploit

Security through obscurity

If anyone ever, ever, ever dares saying again that open-source-ness is not relevant to security assessment (or worse, that it’s counter-productive), I will kick them to China. Freedom of choice, yeah right.

Posted in Sysadmin | Also tagged , , , , | 2 Comments