Date: Fri, 11 Dec 2009 08:49:42 +0000 From: Matthew Seaman <m.seaman@infracaninophile.co.uk> To: Polytropon <freebsd@edvax.de> Cc: "Sam Fourman Jr." <sfourman@gmail.com>, freebsd-current@freebsd.org, Anton Shterenlikht <mexas@bristol.ac.uk>, Bill Moran <wmoran@potentialtech.com>, freebsd-questions@freebsd.org Subject: Re: Root exploit for FreeBSD Message-ID: <4B2207A6.7070204@infracaninophile.co.uk> In-Reply-To: <20091211093023.009125d9.freebsd@edvax.de> References: <20091210144141.GB834@mech-cluster241.men.bris.ac.uk> <20091210095122.a164bf95.wmoran@potentialtech.com> <11167f520912102342y349ebf03tccf886da0ecf53e9@mail.gmail.com> <20091211093023.009125d9.freebsd@edvax.de>
next in thread | previous in thread | raw e-mail | index | archive | help
[-- Attachment #1 --]
Polytropon wrote:
> On Fri, 11 Dec 2009 01:42:36 -0600, "Sam Fourman Jr." <sfourman@gmail.com> wrote:
>> I have tried looking around and OpenBSD appears to be the undisputed
>> #1 track record in terms of security and FreeBSD is #2 (I didn't count
>> dragonflyBSD)
>
> VMS would be #0, then? :-)
I dunno. Haven't seen many MS-DOS exploits recently either...
Matthew
--
Dr Matthew J Seaman MA, D.Phil. Flat 3
7 Priory Courtyard
PGP: http://www.infracaninophile.co.uk/pgpkey Ramsgate
Kent, CT11 9PW, UK
[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.13 (FreeBSD)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iEYEARECAAYFAksiB6sACgkQ3jDkPpsZ+VYvkgCbBeW61RN32p2uqWNgOITWbnDh
zG4An2C5y1OTzd6QOwK92UQHPADGkrpx
=7OT1
-----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4B2207A6.7070204>
