[Info-vax] Programming languages on VMS
DaveFroble
davef at tsoft-inc.com
Tue Jan 30 19:34:00 EST 2018
Simon Clubley wrote:
> On 2018-01-29, DaveFroble <davef at tsoft-inc.com> wrote:
>> It's my thinking that describing something as a risk is sort of like FUD. If I
>> have something that works, does the job, then I use it.
>>
>
> I hope you don't think that way when it comes to operating systems or
> other software that can be potentially used to compromise a system. :-)
>
> In case the point is too subtle, you not only have to think about what
> the software is supposed to do, but also what it may potentially _now_
> be able to do when a newly discovered security vulnerability comes along.
>
> Simon.
>
Ok, I'll be specific, and you can decide.
I've implemented some relays, which act as a service to VMS clients, and then as
a client to trading partners over the internet. I'm using Catalyst SocketTools
for communications, and I keep up to date on versions.
As to why I'm doing this, look no further than the dismal state of
communications on VMS. In this manner I get TLS V1.2 and such for the internet
communications.
The VB6 is just a jacket for the main functionality.
Could there be problems? Sure, always. But in this case I think I have things
such that it's not likely.
--
David Froble Tel: 724-529-0450
Dave Froble Enterprises, Inc. E-Mail: davef at tsoft-inc.com
DFE Ultralights, Inc.
170 Grimplin Road
Vanderbilt, PA 15486
More information about the Info-vax
mailing list