[Info-vax] "Shanghai Stock Exchange" and OpenVMS
Bill Gunshannon
billg999 at cs.uofs.edu
Thu Jan 22 15:31:48 EST 2009
In article <CKqdnel_5rWYS-XUnZ2dnUVZ_v_inZ2d at giganews.com>,
"Richard B. Gilbert" <rgilbert88 at comcast.net> writes:
> Bill Gunshannon wrote:
>> In article <0005d0dd$0$2088$c3e8da3 at news.astraweb.com>,
>> JF Mezei <jfmezei.spamnot at vaxination.ca> writes:
>>> Richard B. Gilbert wrote:
>>>
>>>> You can safely plug them in and turn them on. It's when you connect
>>>> them to a network that you have to worry about "electronic organisms"
>>>> infecting your Windows systems.
>>> This week's virus can be transmitted when you plug in an USB key.
>>>
>>> Sony managed to infect Windows machines when the user inserted a MUSIC
>>> CD into the machines (that rootkit thing).
>>>
>>> So leaving a Windows box unconnected to a network is not a garantee that
>>> it won't be infected.
>>
>> And all of these exploits can be prevented by proper configuration of
>> Windows.
>>
>> bill
>>
>
> And how many people know how to "properly configure Windows"???
How many know how to "properly configure VMS"?
>
> Where is this "proper configuration" documented? The last time I looked
> Windows was shipping without any "documentation".
Well, you can get docs from NIST specifically covering security. And then
there are the checklists from DISA that are publicly available. And, being
as we are talking about supposed professionals in major corporations and
not your momma's PC, if they don't already know where to find this stuff
they certainly should know how to go out and find it. Even Google finds
piles of references including the stuff from NIST.
bill
--
Bill Gunshannon | de-moc-ra-cy (di mok' ra see) n. Three wolves
billg999 at cs.scranton.edu | and a sheep voting on what's for dinner.
University of Scranton |
Scranton, Pennsylvania | #include <std.disclaimer.h>
More information about the Info-vax
mailing list