[Info-vax] Security, support and VMS, was: Re: A new VMS?
Arne Vajhøj
arne at vajhoej.dk
Mon May 3 14:38:10 EDT 2021
On 5/3/2021 2:24 PM, Phillip Helbig (undress to reply) wrote:
> In article <s6pbt4$5hl$1 at dont-email.me>, Simon Clubley
> <clubley at remove_me.eisner.decus.org-Earth.UFP> writes:
>>>> If he is right about this, just think about what will happen when
>>>> one of the security researchers decide to probe x86-64 VMS. Much of
>>>> what they find, and they _will_ find vulnerabilities, will apply to
>>>> earlier architectures as well.
>>>
>>> Your obsession!!
>>
>> We keep getting told that the remaining VMS are super important to their
>> owners and are vital to the running of their organisations.
>
> Yes, but how many of them are running VMS on private networks? Probably
> most.
Practical all systems of any importance are on "private" network
today.
But that does not mean that they can not be attacked.
Unless they are not on a network at all or on a totally
isolated network then attacks can target a computer
that can be used to target a computer that ... and
so on.
Very few networks are totally isolated today. Almost everything
is somewhat connected.
So the attacker targets your wifes iPad, use that to get
to your work laptop, use that to get to the company windows
server and use that to reach the VMS system.
And don't say that can't happen. Remember StuxNet.
Arne
More information about the Info-vax
mailing list