[Info-vax] VAX VMS going forward
John Dallman
jgd at cix.co.uk
Sat Aug 1 05:35:00 EDT 2020
In article <7f6c9c01-51bf-4c1a-9b8f-ed628a437f74o at googlegroups.com>,
dgsoftnz at gmail.com (David Goodwin) wrote:
> If there is a security bug, especially a remotely exploitable one,
> it really needs to be found and fixed ASAP. Thinking no one will
> notice simply because its proprietary software didn't work for
> Windows and it won't work for VMS. If having the source code
> available exposes these security bugs sooner and gets fixes built
> faster then ideally that's what would be done.
Ideally, yes. Corporations that exist to make profits have a natural
reluctance to do something that costs them money (clearing source for
release) and will also cost them money in fixing the newly-found security
bugs.
John
More information about the Info-vax
mailing list