[Info-vax] DNFS1ACP using 100% of CPU

JF Mezei jfmezei.spamnot at vaxination.ca
Sat Oct 12 20:00:33 EDT 2013


On 13-10-12 13:34, Stephen Hoffman wrote:

> You're correct that VMS is not a mass-market security target. 

Botnets/hackers tend to look for vulnerabilities without really checking
the OS type. For instance, a BIND vulnerability is tested on any server
that responds to port 53.

As such, VMS is not any more immune to attempts than any other OS.

Where there is a huge difference is that VMS runs ancient versions of
open source stuff like BIND and those versions do not contain the many
security fixes that have since been issued and thus the VMS version
remains vulnerable to those problems.


Whereas Linux tends to be vulnerable for a couple of weeks before
patches are available, VMS remains vulnerable for years.

A good port scanner will let you know what services OS-X is offering,
and you can block unwanted ones at the router level or disable those
services on OS-X.






More information about the Info-vax mailing list