[Info-vax] VAXstation 4000s available on ebay
glen herrmannsfeldt
gah at ugcs.caltech.edu
Mon Apr 8 14:40:04 EDT 2013
MG <marcogbNO at spamxs4all.nl> wrote:
> On 7-apr-2013 18:10, Peter 'EPLAN' LANGSTOeGER wrote:
>> Exposing VMS to the internet is not that as exposing Windoof to it...
> With or without patch access, I'd personally still be a bit reluctant
> to. Well, I did it for quite some time; especially with my plans, at
> the time, for a remote access cluster setup. (See what I once had
> running here... /at home/, a portion of it for that matter, just so
> you know: <http://winnili.net>.)
I suppose, but statistically you are probably fine. I remember
many many (many) years ago when we were still running SunOS machines,
and were supposed to be upgrading to Solaris, that already more
breakins were on Solaris. (Even though more SunOS attacks were known.)
The reason was that people were using Solaris for web servers
(along with NT, which also has a lot of attacks).
It isn't how easy a system is to break that is important, but
how easy it is weighted by how interested people are in breaking it.
> Back then, I noticed tons of break-in attempts and it never really
> felt too comfortable. I did eventually, as a first step, assign the
> remote SSH port to something other than 22 (as a start). That solved
> part of the problem, but it never felt too great.
Most likely attacks that might work on Windows and Solaris.
I am not sure what the distribution is now for web or mail servers.
(It seems that the Chinese, among others, like attacking mail servers
to steal mail secrets.)
-- glen
More information about the Info-vax
mailing list