|
|
#1
|
||||
|
||||
Re: Sciences on Moon
Quote:
EB{file}$EY$<FS0$216\$;>EX$$ Clear as day, right? FYI, the $ are escapes as show TECO.
__________________
VAXman -- Watcher of the moon, watcher of all. ----------------Mopper of the moon, mopper of all. -------------------- Aural Moon's Janitorial Services ---------------------and Restroom Supplies, and Techno-patsy -- ![]() |
#2
|
|||
|
|||
Re: Sciences on Moon
Quote:
![]() The original EMACS editor (on ITS and TOPS-20?) was obviously written in TECO macros; must have been a lot of fun. -Methem |
#3
|
||||
|
||||
Re: Sciences on Moon
Quote:
I've used TECO, SUMSLP, SOS, EDLINE and EDT on VMS. EDT is the most powerful editor. EVE/TPU I use when there's certain needs but mostly, I only use TPU if I need to write a text processing module.
__________________
VAXman -- Watcher of the moon, watcher of all. ----------------Mopper of the moon, mopper of all. -------------------- Aural Moon's Janitorial Services ---------------------and Restroom Supplies, and Techno-patsy -- ![]() |
#4
|
|||
|
|||
Re: Sciences on Moon
(Sorry for hijacking your beautiful science thread for this sort of stuff, folks.
![]() Quote:
Quote:
The first time I've used VMS was a few years ago when I was doing some summer work in steel industry. The place was a cold-rolling mill, and it was a large annealing and pickling line that processed stainless steel strip. There was an oldish Alpha box with, I think, VMS 6.x installed on it. The box provided some mathematical models and calculations for the the general automation system that controlled the production line. Among other things, the box was used to adjust the temperatures in the large annealing furnace that processed the strip. Now, that was a safe place to experiment with the OS. ![]() -Methem |
#5
|
||||
|
||||
Re: Sciences on Moon
Quote:
Quote:
Quote:
The US Postal service uses VMS to sort and route all mail (letters, packages, flats). The USPS sorts/routes 40K times the volume of all of the other package handling services in the US daily... that's a lot of mail! ...and you wouldn't have the PeeCee either. Intel runs all of its fabs on VMS. They can't afford downtime. Even a few minutes of downtime costs $millions to Intel. ..and until recently, Micro$oft themselves ran all of the accounting for the firm on VMS. Seems even M$ didn't trust their own product when and where it mattered to them most -- the money! Only when a certain application provider HQed in .DE was able to provide a redundancy option in its app -- no longer requiring VMS to protect it -- did M$ get off of VMS. Rumor has it that it's still there for backup. I guess I needn't mention it is secure. Here's SANS' latest list of security vulnerabilities. Note what is NOT on their list.
__________________
VAXman -- Watcher of the moon, watcher of all. ----------------Mopper of the moon, mopper of all. -------------------- Aural Moon's Janitorial Services ---------------------and Restroom Supplies, and Techno-patsy -- ![]() |
#6
|
|||
|
|||
Re: Sciences on Moon
Quote:
Quote:
![]() -Methem Last edited by Methem : 11-18-2006 at 11:31 AM. |
#7
|
||||
|
||||
Re: Sciences on Moon
Quote:
Quote:
Buffer overruns executing arbitrary code? Impossible on VMS. Code and data have always been segregated. Pages in memory have protections that protect inner (privileged) modes from executing code -- malicious or otherwise. The whole "privilege" paradigm in VMS extends to all objects -- processes/jobs, memory, disk, images, etc. The image activator, once an image has been activated, keeps the code sections in mapped virtual pages that are read only. Any attempt to do/use a data overrun (one of the major mechanisms employed to breach other systems) would yield an Access Violation when it tried to write in a code region. IF it would only over write data in a process's image data space, it could NEVER be executed even if written there. Now, if somebody wants to download malicious code from a sight, install it with privies and subsequently execute it, that will be a problem. However, it is not a security issue in the OS; that is a security issue with the idiot that installed the malicious code. VMS development is a process. Code is reviewed by others in the group. Data integrity and security are the chief criteria for the code review. Feature parity is way down on the list. Features are not introduced if they sacrifice the aforementioned. I could ramble on for hours. There are OS constructs that do not exist in any other OS. They are there for a reason -- data integrity and security. These things were designed into the OS from the get-go; not layered on as an after thought. If the foundation of flawed and weak, no amount of plastered on after thought security is going to prevent a breach.
__________________
VAXman -- Watcher of the moon, watcher of all. ----------------Mopper of the moon, mopper of all. -------------------- Aural Moon's Janitorial Services ---------------------and Restroom Supplies, and Techno-patsy -- ![]() |
![]() |
Thread Tools | |
Display Modes | Rate This Thread |
|
|
All times are GMT -5. The time now is 02:13 PM. |