<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: OpenVMS Security merits etc. in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/openvms-security-merits-etc/m-p/3336982#M29210</link>
    <description>Brian,&lt;BR /&gt;&lt;BR /&gt;The whitepapers already mentioned are a good start.&lt;BR /&gt;&lt;BR /&gt;Another point would be my presentation at HPWORLD 2004 on managing user environments at&lt;BR /&gt;&lt;A href="http://www.rlgsc.com/hpworld/2004/n227.html." target="_blank"&gt;http://www.rlgsc.com/hpworld/2004/n227.html.&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;See the reports written by the late John Wisniewski of the (unsuccessful) DEFCON 9 cracking attempts against OpenVMS.&lt;BR /&gt;&lt;BR /&gt;Also, see some of my published articles on OpenVMS.org.&lt;BR /&gt;&lt;BR /&gt;I hope that the above is useful.&lt;BR /&gt;&lt;BR /&gt;- Bob Gezelter, &lt;A href="http://www.rlgsc.com" target="_blank"&gt;http://www.rlgsc.com&lt;/A&gt;</description>
    <pubDate>Sun, 12 Dec 2004 09:10:31 GMT</pubDate>
    <dc:creator>Robert Gezelter</dc:creator>
    <dc:date>2004-12-12T09:10:31Z</dc:date>
    <item>
      <title>OpenVMS Security merits etc.</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/openvms-security-merits-etc/m-p/3336974#M29202</link>
      <description>Hi Folks,&lt;BR /&gt;&lt;BR /&gt;Just a quick request for help and information. Like many companies we're trying to persuade our clients to remain with OpenVMS rather than a migration to Windows. We've tried migrations in the past and as a rule it takes too long, the only benefits tend to be that the hardware is cheaper (but fails more frequently).&lt;BR /&gt;&lt;BR /&gt;Anyway, security of the systems has again raised its head, and I'm just wondering if anybody has come across articles detailing the security/management aspects of the follows OSes. (I've been asked to produce a quick report on the OSes currently in use and I don't have the time at the mo' for a full scale internet browsing session)&lt;BR /&gt;&lt;BR /&gt;OpenVMS (I know about this bit)&lt;BR /&gt;AIX Unix&lt;BR /&gt;LINUS&lt;BR /&gt;Windows (XP/Server)&lt;BR /&gt;&lt;BR /&gt;I know I may get a slightly biased view :) from this forum but any links to articles/papers would be appreciated.&lt;BR /&gt;&lt;BR /&gt;thanks for your help&lt;BR /&gt;&lt;BR /&gt;Brian&lt;BR /&gt;</description>
      <pubDate>Wed, 21 Jul 2004 02:27:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/openvms-security-merits-etc/m-p/3336974#M29202</guid>
      <dc:creator>Brian Reiter</dc:creator>
      <dc:date>2004-07-21T02:27:46Z</dc:date>
    </item>
    <item>
      <title>Re: OpenVMS Security merits etc.</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/openvms-security-merits-etc/m-p/3336975#M29203</link>
      <description>Brian,&lt;BR /&gt;I remember another thread about this argoument &lt;A href="http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=555089" target="_blank"&gt;http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=555089&lt;/A&gt;&lt;BR /&gt; &lt;BR /&gt;Perhaps can help you ?&lt;BR /&gt; &lt;BR /&gt;Antonio Vigliotti&lt;BR /&gt;</description>
      <pubDate>Wed, 21 Jul 2004 03:26:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/openvms-security-merits-etc/m-p/3336975#M29203</guid>
      <dc:creator>Antoniov.</dc:creator>
      <dc:date>2004-07-21T03:26:39Z</dc:date>
    </item>
    <item>
      <title>Re: OpenVMS Security merits etc.</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/openvms-security-merits-etc/m-p/3336976#M29204</link>
      <description>More interested in security info on all 4 platforms. I've just read John Wisniewski's security for OpenVMS presentation (well worth it), which covers most of what I wanted to know for VMS. &lt;BR /&gt;&lt;BR /&gt;cheers &lt;BR /&gt;&lt;BR /&gt;Brian</description>
      <pubDate>Wed, 21 Jul 2004 03:45:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/openvms-security-merits-etc/m-p/3336976#M29204</guid>
      <dc:creator>Brian Reiter</dc:creator>
      <dc:date>2004-07-21T03:45:41Z</dc:date>
    </item>
    <item>
      <title>Re: OpenVMS Security merits etc.</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/openvms-security-merits-etc/m-p/3336977#M29205</link>
      <description>See also&lt;BR /&gt;&lt;A href="http://h71000.www7.hp.com/openvms/whitepapers/TCS_2004.pdf" target="_blank"&gt;http://h71000.www7.hp.com/openvms/whitepapers/TCS_2004.pdf&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;and&lt;BR /&gt;&lt;A href="http://itmanagement.earthweb.com/erp/article.php/3380341" target="_blank"&gt;http://itmanagement.earthweb.com/erp/article.php/3380341&lt;/A&gt;&lt;BR /&gt;and&lt;BR /&gt;&lt;A href="http://www.computerweekly.com/articles/article.asp?liArticleID=131808" target="_blank"&gt;http://www.computerweekly.com/articles/article.asp?liArticleID=131808&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 21 Jul 2004 05:38:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/openvms-security-merits-etc/m-p/3336977#M29205</guid>
      <dc:creator>Ian Miller.</dc:creator>
      <dc:date>2004-07-21T05:38:42Z</dc:date>
    </item>
    <item>
      <title>Re: OpenVMS Security merits etc.</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/openvms-security-merits-etc/m-p/3336978#M29206</link>
      <description>&lt;BR /&gt;Here are a few more articles with statements concerning the security of Operating Systems other than OpenVMS.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Lead Windows developer bugged by security&lt;BR /&gt;&lt;A href="http://www.nwfusion.com/news/2002/0905valen.html" target="_blank"&gt;http://www.nwfusion.com/news/2002/0905valen.html&lt;/A&gt;&lt;BR /&gt;Linux is favourite hacker target: Study - Globetechnology&lt;BR /&gt;&lt;A href="http://www.globetechnology.com/servlet/story/RTGAM.20030911.gtlinuxsep11/BNStory/Technology/" target="_blank"&gt;http://www.globetechnology.com/servlet/story/RTGAM.20030911.gtlinuxsep11/BNStory/Technology/&lt;/A&gt;&lt;BR /&gt;Microsoft cerebrates fifteen years of poor security&lt;BR /&gt;&lt;A href="http://www.theinquirer.net/?article=11108" target="_blank"&gt;http://www.theinquirer.net/?article=11108&lt;/A&gt;&lt;BR /&gt;Microsoft software 'riddled with vulnerabilities', trade body claims&lt;BR /&gt;&lt;A href="http://www.theinquirer.net/?article=11249" target="_blank"&gt;http://www.theinquirer.net/?article=11249&lt;/A&gt;&lt;BR /&gt;MS: Secure computing is still a decade away&lt;BR /&gt;&lt;A href="http://reviews-zdnet.com.com/4520-7297_16-4207833.html" target="_blank"&gt;http://reviews-zdnet.com.com/4520-7297_16-4207833.html&lt;/A&gt;&lt;BR /&gt;Next-Generation Win32 exploits: fundamental API flaws&lt;BR /&gt;&lt;A href="http://security.tombom.co.uk/shatter.html" target="_blank"&gt;http://security.tombom.co.uk/shatter.html&lt;/A&gt;&lt;BR /&gt;Nimda Worm Shows You Can't Always Patch Fast Enough&lt;BR /&gt;&lt;A href="http://www.gartner.com/DisplayDocument?doc_cd=101034" target="_blank"&gt;http://www.gartner.com/DisplayDocument?doc_cd=101034&lt;/A&gt;&lt;BR /&gt;Reliance On Microsoft Danger To National Security&lt;BR /&gt;&lt;A href="http://www.techweb.com/wire/story/TWB20030924S0008" target="_blank"&gt;http://www.techweb.com/wire/story/TWB20030924S0008&lt;/A&gt;&lt;BR /&gt;Software vulnerabilities still dog operating systems&lt;BR /&gt;&lt;A href="http://www.theinquirer.net/?article=13420" target="_blank"&gt;http://www.theinquirer.net/?article=13420&lt;/A&gt;&lt;BR /&gt;Would the real insecure OS please stand up?&lt;BR /&gt;&lt;A href="http://arstechnica.com/news/posts/20021127-882.html" target="_blank"&gt;http://arstechnica.com/news/posts/20021127-882.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;The discourse "Next-Generation Win32 exploits: fundamental API flaws" also known as The Shatter Exploit Paper is especially damning of Windows. Essentially, it states that the Win32 API has an inherently flawed design with regard to security, and this design can't be corrected without making all Win32 API based applications incompatible and obsolete.&lt;BR /&gt;&lt;BR /&gt;Cheers!&lt;BR /&gt;&lt;BR /&gt;Keith Cayemberg&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 21 Jul 2004 08:32:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/openvms-security-merits-etc/m-p/3336978#M29206</guid>
      <dc:creator>Keith Cayemberg</dc:creator>
      <dc:date>2004-07-21T08:32:37Z</dc:date>
    </item>
    <item>
      <title>Re: OpenVMS Security merits etc.</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/openvms-security-merits-etc/m-p/3336979#M29207</link>
      <description>Hi Brian,&lt;BR /&gt;&lt;BR /&gt;if security also encompasses "How often do I have to patch the system" the new TCO study comparing VMS and AIX might be of interest.&lt;BR /&gt;&lt;BR /&gt;It is over at &lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://h71000.www7.hp.com/news/tco.html" target="_blank"&gt;http://h71000.www7.hp.com/news/tco.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Greetings, Martin</description>
      <pubDate>Wed, 21 Jul 2004 20:50:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/openvms-security-merits-etc/m-p/3336979#M29207</guid>
      <dc:creator>Martin P.J. Zinser</dc:creator>
      <dc:date>2004-07-21T20:50:59Z</dc:date>
    </item>
    <item>
      <title>Re: OpenVMS Security merits etc.</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/openvms-security-merits-etc/m-p/3336980#M29208</link>
      <description>Hi Folks,&lt;BR /&gt;&lt;BR /&gt;Thanks for your help. At least now we can give some very good reasons for not wanting to migrate important and vital system to a Windows platform. It may still happen but at least we aren't rolling over and agreeing with the client (and their possee of consultants).&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;regards&lt;BR /&gt;&lt;BR /&gt;Brian</description>
      <pubDate>Thu, 22 Jul 2004 02:05:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/openvms-security-merits-etc/m-p/3336980#M29208</guid>
      <dc:creator>Brian Reiter</dc:creator>
      <dc:date>2004-07-22T02:05:57Z</dc:date>
    </item>
    <item>
      <title>Re: OpenVMS Security merits etc.</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/openvms-security-merits-etc/m-p/3336981#M29209</link>
      <description>See also&lt;BR /&gt;&lt;A href="http://groups.google.com/groups?selm=3a65a5c8.0401091542.1df169b%40posting.google.com" target="_blank"&gt;http://groups.google.com/groups?selm=3a65a5c8.0401091542.1df169b%40posting.google.com&lt;/A&gt;&lt;BR /&gt;and&lt;BR /&gt;&lt;A href="http://www.google.com/groups?hl=en&amp;amp;lr=&amp;amp;ie=UTF-8&amp;amp;threadm=40fec85a%240%2419744%249b4e6d93%40newsread2.arcor-online.net&amp;amp;rnum=1&amp;amp;prev=/groups%3Fq%3Dgroup:comp.os.vms%2Binsubject:OpenVMS%2Binsubject:security%2Bauthor:Keith%2Bauthor:Cayemberg%26hl%3Den%26lr%3D%26ie%3DUTF-8%26as_drrb%3Db%26as_mind%3D21%26as_minm%3D7%26as_miny%3D2004%26as_maxd%3D23%26as_maxm%3D7%26as_maxy%3D2004%26selm%3D40fec85a%25240%252419744%25249b4e6d93%2540newsread2.arcor-online.net%26rnum%3D1" target="_blank"&gt;http://www.google.com/groups?hl=en&amp;amp;lr=&amp;amp;ie=UTF-8&amp;amp;threadm=40fec85a%240%2419744%249b4e6d93%40newsread2.arcor-online.net&amp;amp;rnum=1&amp;amp;prev=/groups%3Fq%3Dgroup:comp.os.vms%2Binsubject:OpenVMS%2Binsubject:security%2Bauthor:Keith%2Bauthor:Cayemberg%26hl%3Den%26lr%3D%26ie%3DUTF-8%26as_drrb%3Db%26as_mind%3D21%26as_minm%3D7%26as_miny%3D2004%26as_maxd%3D23%26as_maxm%3D7%26as_maxy%3D2004%26selm%3D40fec85a%25240%252419744%25249b4e6d93%2540newsread2.arcor-online.net%26rnum%3D1&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 23 Jul 2004 03:39:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/openvms-security-merits-etc/m-p/3336981#M29209</guid>
      <dc:creator>Ian Miller.</dc:creator>
      <dc:date>2004-07-23T03:39:19Z</dc:date>
    </item>
    <item>
      <title>Re: OpenVMS Security merits etc.</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/openvms-security-merits-etc/m-p/3336982#M29210</link>
      <description>Brian,&lt;BR /&gt;&lt;BR /&gt;The whitepapers already mentioned are a good start.&lt;BR /&gt;&lt;BR /&gt;Another point would be my presentation at HPWORLD 2004 on managing user environments at&lt;BR /&gt;&lt;A href="http://www.rlgsc.com/hpworld/2004/n227.html." target="_blank"&gt;http://www.rlgsc.com/hpworld/2004/n227.html.&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;See the reports written by the late John Wisniewski of the (unsuccessful) DEFCON 9 cracking attempts against OpenVMS.&lt;BR /&gt;&lt;BR /&gt;Also, see some of my published articles on OpenVMS.org.&lt;BR /&gt;&lt;BR /&gt;I hope that the above is useful.&lt;BR /&gt;&lt;BR /&gt;- Bob Gezelter, &lt;A href="http://www.rlgsc.com" target="_blank"&gt;http://www.rlgsc.com&lt;/A&gt;</description>
      <pubDate>Sun, 12 Dec 2004 09:10:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/openvms-security-merits-etc/m-p/3336982#M29210</guid>
      <dc:creator>Robert Gezelter</dc:creator>
      <dc:date>2004-12-12T09:10:31Z</dc:date>
    </item>
  </channel>
</rss>

