On Sat, 19 Aug 2006, Dave McGuire wrote:
On Aug 18, 2006, at 3:55 PM, Alexey Toptygin wrote:
>> [I'm intensely interested in this as to
how it can be done
>> to make applications in consumer devices "hacker hardened"]
> Run VMS ;-)
Bt, is that truly "hacker proof" or "hardened by obscurity"? :>
hacker proof. Just google for "vms defcon 9"
The fact that no-one at defcon 9 knows VMS well enough to break into a VMS
box says nothing of the security of VMS; it only says something about it's
popularity.
Ahhh, somebody doesn't know how widely deployed VMS systems are, but I
won't point any fingers!
So what you're saying is that VMS is more widely deployed than systems
that _were_ compromised at defcon 9? More than Win32, Solaris, Linux,
*BSD? And where are these millions of VMS deployments? I'm the secretary
of a DC metro area system administrators group (>300 members), and I've
only heard of one VMS system in the DC area mentioned in our group over
the 5+ years I've been a member. They were migrating off of it.
I'm not saying there aren't VMS deployments, but I think you're saying
they're comprably common to Windows, Mac or UNIX and everything I know
tells me that is wrong.
Alexey