From owner-freebsd-questions@FreeBSD.ORG Sat Dec 12 22:24:47 2009 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 07E9F106568D for ; Sat, 12 Dec 2009 22:24:47 +0000 (UTC) (envelope-from david@vizion2000.net) Received: from dns1.vizion2000.net (dns1.vizion2000.net [62.49.197.50]) by mx1.freebsd.org (Postfix) with ESMTP id B711C8FC20 for ; Sat, 12 Dec 2009 22:24:46 +0000 (UTC) Received: by dns1.vizion2000.net (Postfix, from userid 1001) id 57E2C34D45C; Sat, 12 Dec 2009 22:24:37 +0000 (GMT) From: David Southwell Organization: Voice & Vision To: freebsd-questions@freebsd.org, utisoft@gmail.com Date: Sat, 12 Dec 2009 22:24:37 +0000 User-Agent: KMail/1.12.4 (FreeBSD/7.2-RELEASE-p3; KDE/4.3.4; amd64; ; ) References: <4B2207A6.7070204@infracaninophile.co.uk> <20091211232356.309C21CC09@ptavv.es.net> In-Reply-To: MIME-Version: 1.0 Content-Type: Text/Plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Message-Id: <200912122224.37295.david@vizion2000.net> Cc: Kevin Oberman Subject: Re: Root exploit for FreeBSD X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 12 Dec 2009 22:24:47 -0000 > 2009/12/11 Kevin Oberman : > >> Date: Fri, 11 Dec 2009 08:49:42 +0000 > >> From: Matthew Seaman > >> Sender: owner-freebsd-current@freebsd.org > >> > >> Polytropon wrote: > >> > On Fri, 11 Dec 2009 01:42:36 -0600, "Sam Fourman Jr." wrote: > >> >> I have tried looking around and OpenBSD appears to be the undisputed > >> >> #1 track record in terms of security and FreeBSD is #2 (I didn't > >> >> count dragonflyBSD) > >> > > >> > VMS would be #0, then? :-) > >> > >> I dunno. Haven't seen many MS-DOS exploits recently either... > > > > I'm sure that there are systems happily running MSDOS, but I bet not too > > many are networked. > > > > I know that there is still a lot of VMS out there and that it has > > remained a cash cow for HP. It lived on primarily in the banking and > > financial sector, though I guess the use is dropping since HP recently > > outsourced support to India and that lead to the retirement of the last > > of the original VMS developers, Andy Goldstein. > > > > Also, the the end of TECO as Andy was responsible for porting it to > > almost every platform DEC ever sold (RSX, RSTS, VMS, TOPS-10 and > > TOPS-20, RT-11, and several others) and continued to maintain it until > > his retirement. (Most readers of this list probably don't even remember > > TECO.) > > > > And, for may years VMS had major network security problems, especially > > the infamous default DECNET/DECNET account that lead to may compromises > > and the second major network worm, Worms Against Nuclear Killers. (I > > won't use the acronym so as not to offend our British readers. I found > > out about that when the BBC interviewed me about it and I was told that > > I could not utter the word.) > > Wow, I didn't know your side don't use that word... I thought I knew > about all the stereotypically British ones! > > Do you guys have any curses or insults at all??? > > Chris > I ran a radio show in the states - the language restrictions there woooooooooooow were they strict!! David