Sorry if this is a duplicate, but I've neither seen my original
posting from last Thursday, nor seen any responses to it.
This question is directed at firewallers/sysadmins who *know* VMS.
If you're the typical VMS sysadmin, and you're using well-known
methods/utilities of locking down the security on VMS (not TIS and
friends, but perhaps commercial packages), can one say with confidence
that this VMS host is impervious to cracker attacks?
I suspect the answer is "no," and would like to hear responses from
in-the-know folks who have recovered from their helpless laughter
enough to respond to this, i.e., I'd like to punch a few holes in this
argument myself, but don't know VMS, nor the popular tools that go
Jim Carroll -- jimc @
e-Commerce, Inc., 1030 Kamato Road, Suite 201
Mississauga, Ontario, Canada L4W 4B6
Tel: +1 905 602 0863 Fax: +1 905 603 8402