security through obscurity Archive
There’s a bunch of companies that provides services for cloaking the user’s website. In the previous articles Web scraping – part 1 and Web scraping – part 2 we learned how easy it was to scan multiple sites for vulnerabilities using footprints. This very exact method is dependent on that out footprints can be found on the site –