[Info-vax] OpenVMS x64 Atom project
ultr...@gmail.com
ultradwc at gmail.com
Fri Jun 4 12:22:07 EDT 2021
On Thursday, June 3, 2021 at 1:23:44 PM UTC-4, Simon Clubley wrote:
> On 2021-06-03, Dave Froble <da... at tsoft-inc.com> wrote:
> > On 6/3/2021 8:11 AM, Simon Clubley wrote:
> >> VMS is missing security protections common in other operating systems.
> >
> > You mean all those "secure" systems that are constantly being hacked,
> > invaded with ransomware and such. Are those the "common security
> > protections" you're talking about?
> >
> > Perhaps I'd rather be not as "secure" ...
> >
> Those operating systems are being probed on a daily basis by an entire
> army of security researchers who are very good at what they do.
>
> How long do you think VMS would survive if it was exposed to that
> level of probing on a daily basis ?
> >> Anyone saying the above does not have a clue about what is required
> >> on the desktop or what is standard on other operating systems when
> >> it comes to security.
> >
> > "Standard" as in "known how to hack"? Perhaps it's time for another
> > direction?
> >
> Security by obscurity is not real security.
>
> It only gives (wrongly) the illusion of security to some people.
> Simon.
>
> --
> Simon Clubley, clubley at remove_me.eisner.decus.org-Earth.UFP
> Walking destinations on a map are further away than they appear.
So are you saying that OpenVMS security features and 3 layer security doesn't work, or that they were compromised due
to poor or no security implementation?
Or are these holes being introduced by your garbage c programs not terminated properly producing buffer overflow holes?
If OpenVMS security features such as ACLs work PROPERLY, running live or backend to some junk linux box that gets compromised
should not affect a properly configured OpenVMS box.
More information about the Info-vax
mailing list