[Info-vax] VAX VMS going forward

John Dallman jgd at cix.co.uk
Sat Aug 1 05:35:00 EDT 2020


In article <7f6c9c01-51bf-4c1a-9b8f-ed628a437f74o at googlegroups.com>,
dgsoftnz at gmail.com (David Goodwin) wrote:

> If there is a security bug, especially a remotely exploitable one, 
> it really needs to be found and fixed ASAP. Thinking no one will 
> notice simply because its proprietary software didn't work for 
> Windows and it won't work for VMS. If having the source code 
> available exposes these security bugs sooner and gets fixes built 
> faster then ideally that's what would be done.

Ideally, yes. Corporations that exist to make profits have a natural
reluctance to do something that costs them money (clearing source for
release) and will also cost them money in fixing the newly-found security
bugs.

John 



More information about the Info-vax mailing list