On 02/15/2011 09:29 AM, C F wrote:
"Security through obscurity" does not work with open source software.
What a bold statement, are you telling me it works with closed source
software? :P
Depends on your definition of 'works' I guess :-)
With closed source software, it takes rather longer to figure out a way
around the obscuring mechanism(s), but if enough people are interested
in doing so, they will. With open source software, pretty much anyone
can get around such mechanisms in a short period of time.
--
Kevin P. Fleming
Digium, Inc. | Director of Software Technologies
445 Jan Davis Drive NW - Huntsville, AL 35806 - USA
skype: kpfleming | jabber: kflem...@digium.com
Check us out at www.digium.com & www.asterisk.org
--
_____________________________________________________________________
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
http://www.asterisk.org/hello
asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
http://lists.digium.com/mailman/listinfo/asterisk-users