[Info-vax] "Shanghai Stock Exchange" and OpenVMS
Bill Gunshannon
billg999 at cs.uofs.edu
Thu Jan 22 20:49:53 EST 2009
In article <glaua6$4pu$1 at tempo.update.uu.se>,
Johnny Billquist <bqt at softjar.se> writes:
> Bill Gunshannon wrote:
>> In article <CKqdnel_5rWYS-XUnZ2dnUVZ_v_inZ2d at giganews.com>,
>> "Richard B. Gilbert" <rgilbert88 at comcast.net> writes:
>>> Bill Gunshannon wrote:
>>>> In article <0005d0dd$0$2088$c3e8da3 at news.astraweb.com>,
>>>> JF Mezei <jfmezei.spamnot at vaxination.ca> writes:
>>>>> Richard B. Gilbert wrote:
>>>>>
>>>>>> You can safely plug them in and turn them on. It's when you connect
>>>>>> them to a network that you have to worry about "electronic organisms"
>>>>>> infecting your Windows systems.
>>>>> This week's virus can be transmitted when you plug in an USB key.
>>>>>
>>>>> Sony managed to infect Windows machines when the user inserted a MUSIC
>>>>> CD into the machines (that rootkit thing).
>>>>>
>>>>> So leaving a Windows box unconnected to a network is not a garantee that
>>>>> it won't be infected.
>>>> And all of these exploits can be prevented by proper configuration of
>>>> Windows.
>>>>
>>>> bill
>>>>
>>> And how many people know how to "properly configure Windows"???
>>
>> How many know how to "properly configure VMS"?
>>
>>> Where is this "proper configuration" documented? The last time I looked
>>> Windows was shipping without any "documentation".
>>
>> Well, you can get docs from NIST specifically covering security. And then
>> there are the checklists from DISA that are publicly available. And, being
>> as we are talking about supposed professionals in major corporations and
>> not your momma's PC, if they don't already know where to find this stuff
>> they certainly should know how to go out and find it. Even Google finds
>> piles of references including the stuff from NIST.
>
> Right. So, all you have to do to make your Windows computer safe is surf
> around a while, look at various places, which you *hope* will give you
> good information, and not actually make your machine more exploitable
> (how do you know what to trust on the Internet?).
I realize you are not from this side of the pond, but I cn assure I
would trust security information I got from DISA, NIST and NSA (yes,
I looked today and they do Windows security docs, too) long before
I would trust what I was likely to get from HP. :-)
> So you boot your
> machine, insert a CD or two, to install some software, hopefully don't
> insert any music CDs, surf around without catching the attention of
> anyone who just happens to probe your machine before you manager to
> improve the security.
I thought we were talking about datacenters and professionals here?
Of course you secure the machine before you put it into the production
environment. I would hope the same was true of VMS no matte rhow secure
you think it is.
> Find information on the net which is correct, and
> which you can trust, which you then follow. And then you hope that there
> isn't even more you need to do which isn't mentioned anywhere you can
> find (how did you even know what to look for in the first place?).
Well, just for the fun of it I typed "Securing Windows" into google.
Got lots of stuff. Tried a few more times adding "NIST", "DISA" and
"NSA" each time and pretty much found all the stuff I have been telling
people here about for years. Some people just don't want to hear.
They are quite happy living with their delusion.
>
> Don't you see how ridiculous this is?
Not at all. Claiming that Windows can't be secured when what you really
mean is I want it to be that way out of the box is ridiculous. We are
supposed to be professionals. If everyone could do this we wouldn't have
jobs.
bill
--
Bill Gunshannon | de-moc-ra-cy (di mok' ra see) n. Three wolves
billg999 at cs.scranton.edu | and a sheep voting on what's for dinner.
University of Scranton |
Scranton, Pennsylvania | #include <std.disclaimer.h>
More information about the Info-vax
mailing list