Computer security is one of the key tasks of our time. Attacks on equipment in the network are constantly and leave large damages in the integrity of the data. There are many methods of computer security, one of which is the method of security through obscurity. The article analyzes the actions of system administrators to ensure server security using the “security through obscurity” method.
Keywords: computer security, security through obscurity, cryptography, decoding, setting up web servers