Security concepts
Security Through Obscurity (STO)
What is security through obscurity and what are examples when it comes to Linux security and system hardening?
What is security through obscurity and what are examples when it comes to Linux security and system hardening?