Jump to content

Security through obscurity: Revision history


For any version listed below, click on its date to view it. For more help, see Help:Page history and Help:Edit summary. (cur) = difference from current version, (prev) = difference from preceding version, m = minor edit, → = section edit, ← = automatic edit summary

(newest | oldest) View (newer 50 | ) (20 | 50 | 100 | 250 | 500)

10 November 2024

14 October 2024

12 October 2024

23 September 2024

17 July 2024

26 June 2024

6 June 2024

17 May 2024

15 May 2024

5 April 2024

15 January 2024

6 December 2023

8 November 2023

9 October 2023

7 October 2023

28 September 2023

28 August 2023

  • curprev 00:4500:45, 28 August 2023 ElliotKillick talk contribs 10,333 bytes +495 Add most commonly seen example of security through obscurity measure commonly seen by everyday people in computer systems. There are tons of secret YARA and similar signatures used for detecting payloads and techniques. undo

11 August 2023

28 July 2023

18 July 2023

  • curprev 14:3914:39, 18 July 2023 104.245.20.170 talk 8,513 bytes +26 The first sentence when I opened it up was really hard to read. I think this is easier to read, and still gets the same facts across. Please correct me if I'm wrong undo

3 July 2023

7 May 2023

26 March 2023

12 February 2023

25 January 2023

14 October 2022

16 September 2022

19 August 2022

12 May 2022

18 January 2022

30 December 2021

26 November 2021

14 October 2021

10 October 2021

(newest | oldest) View (newer 50 | ) (20 | 50 | 100 | 250 | 500)