Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 11 Dec 2009 08:49:42 +0000
From:      Matthew Seaman <m.seaman@infracaninophile.co.uk>
To:        Polytropon <freebsd@edvax.de>
Cc:        "Sam Fourman Jr." <sfourman@gmail.com>, freebsd-current@freebsd.org, Anton Shterenlikht <mexas@bristol.ac.uk>, Bill Moran <wmoran@potentialtech.com>, freebsd-questions@freebsd.org
Subject:   Re: Root exploit for FreeBSD
Message-ID:  <4B2207A6.7070204@infracaninophile.co.uk>
In-Reply-To: <20091211093023.009125d9.freebsd@edvax.de>
References:  <20091210144141.GB834@mech-cluster241.men.bris.ac.uk>	<20091210095122.a164bf95.wmoran@potentialtech.com>	<11167f520912102342y349ebf03tccf886da0ecf53e9@mail.gmail.com> <20091211093023.009125d9.freebsd@edvax.de>

next in thread | previous in thread | raw e-mail | index | archive | help

[-- Attachment #1 --]
Polytropon wrote:
> On Fri, 11 Dec 2009 01:42:36 -0600, "Sam Fourman Jr." <sfourman@gmail.com> wrote:
>> I have tried looking around and OpenBSD appears to be the undisputed
>> #1 track record in terms of security and FreeBSD is #2 (I didn't count
>> dragonflyBSD)
> 
> VMS would be #0, then? :-)

I dunno.  Haven't seen many MS-DOS exploits recently either...

	Matthew

-- 
Dr Matthew J Seaman MA, D.Phil.                       Flat 3
                                                      7 Priory Courtyard
PGP: http://www.infracaninophile.co.uk/pgpkey         Ramsgate
                                                      Kent, CT11 9PW, UK


[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.13 (FreeBSD)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAksiB6sACgkQ3jDkPpsZ+VYvkgCbBeW61RN32p2uqWNgOITWbnDh
zG4An2C5y1OTzd6QOwK92UQHPADGkrpx
=7OT1
-----END PGP SIGNATURE-----

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4B2207A6.7070204>