[Info-vax] OpenVMS x64 Atom project

Bill Gunshannon bill.gunshannon at gmail.com
Mon Jun 7 14:53:41 EDT 2021


On 6/7/21 2:11 PM, Dave Froble wrote:
> On 6/7/2021 1:45 PM, Bill Gunshannon wrote:
>> On 6/6/21 11:42 AM, Arne Vajhøj wrote:
>>> On 6/3/2021 2:37 PM, Arne Vajhøj wrote:
>>>> On 6/3/2021 1:04 PM, Bill Gunshannon wrote:
>>>>> On 6/3/21 9:39 AM, Dave Froble wrote:
>>>>>> On 6/3/2021 8:11 AM, Simon Clubley wrote:
>>>>>>> VMS is missing security protections common in other operating
>>>>>>> systems.
>>>>>>
>>>>>> You mean all those "secure" systems that are constantly being
>>>>>> hacked, invaded with ransomware and such.  Are those the "common
>>>>>> security protections" you're talking about?
>>>>>>
>>>>>> Perhaps I'd rather be not as "secure" ...
>>>>>
>>>>> Either you don;lt understand any of this or you just haven't been
>>>>> paying
>>>>> attention.  The places being hit are, in most of the stated cases, not
>>>>> using any of the accepted security practices.
>>>>
>>>> The fact that it happened prove that they did something wrong.
>>>>
>>>> But they may have done 99 things right and only missed 1.
>>>>
>>>> That is the underlying problem in this: to protect a system you need to
>>>> protect against all attacks - to successfully attack a system you
>>>> only need to fine one that is not protected against.
>>>
>>> It has now become public that the pipeline got hit because:
>>> - a user had the same password at another site as for VPN to them
>>> - that other site got compromised and the password database got stolen
>>>    and cracked
>>> - MFA not used
>>>
>>> Rather trivial, but a lot of breaches are considered trivial - after
>>> the fact.
>>>
>>
>> As I have said before, the only breach we had when I was the
>> administrator of the CS Department was one user account and
>> that was because he used his department password for a WordPress
>> account on the Web somewhere and we all know how good their
>> security is.
>>
>> Humans are the biggest threat to IT Systems and, so far, no one
>> has figured out how to patch them fix the problem.
>>
>> bill
>>
>>
> 
> First, do away with passwords.  Don't some phones now need a fingerprint 
> to access?  Guess that data could be copied, and used. 

A couple of high school kids beat fingerprint scanners several years
ago.  I'm sure the pros beat it long before that.

>                                                        Remote access is 
> always an issue, and it just ain't going away.
> 
> Then, one must convince the management to cough up the funds for such 
> things.  That ain't gonna happen.  At least not before lots of pain.
> 

And then you have facial recognition.  I understand that has already
been beaten with a photograph. (And we don't even need to go into the
serious potential problems with false negatives!!)

bill





More information about the Info-vax mailing list