<tricky to exploit anyway -- the cracker needed to have read the
<source code).
I'd say VMS is the best I've worked with as the base security is pretty
tight. It also has the less than common attribute.
As a system it falls into my criteria:
Stable mature systems I know how to use.
Allison