[Info-vax] Whither VMS?
John Santos
john at egh.com
Thu Oct 8 21:43:14 EDT 2009
In article <paul.nospam-4799A6.21263308102009 at pbook.sture.ch>,
paul.nospam at sture.ch says...>
> In article <7ivb7rF32o3n0U1 at mid.individual.net>,
> billg999 at cs.uofs.edu (Bill Gunshannon) wrote:
>
> > In article <gKBLIl0YcnM+ at eisner.encompasserve.org>,
> > koehler at eisner.nospam.encompasserve.org (Bob Koehler) writes:
> > > In article <7ire14F32vm9nU2 at mid.individual.net>, billg999 at cs.uofs.edu (Bill
> > > Gunshannon) writes:
> > >>
> > >> And once again we blame the language for the incompetence (or just plain
> > >> laziness) of the programmers.
> > >
> > > That's like blaiming the carpenter who loses his hand to a circular
> > > saw without a blade guard. The saw should have had the blade guard.
> >
> > The saw wasn't made without a blade guard (at least none I ever used was).
> > It is still the fault of the operator for using it improperly.
> >
> > When C is used properly it works just fine and doesn't have any more
> > security problems than any other language. I have never written a
> > program that was exploited thru a buffer overflow.
> >
>
> Going back to my student holiday job days there were employers who would
> disable safety guards to enhance productivity.
>
> And employees on piece rate pay who would disable safety guards
> themselves.
Ever see the movie about Johnny Cash, and what happened to his brother?
There seem to have been no safety guards to be removed. Just like C.
--
John Santos
Evans Griffiths & Hart, Inc.
More information about the Info-vax
mailing list