lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <Pine.LNX.4.44.0310270827350.11436-100000@matrix.coldrain.net> From: bruen at coldrain.net (Stormwalker) Subject: [inbox] Re: RE: Linux (in)security On Sun, 26 Oct 2003, Bruce Ediger wrote: >... > Well, no, but I don't believe your theory either. VMS usually gets > held up as an example of an OS without significant security problems. > Sorry to tell you, but DEC wrote VMS mainly in VAX-11 assembler. > The Alpha-CPU port of VMS involved writing a VAX-11 assember compiler, > and compiling the VAX assembly code to Alpha object code. Perhaps my memory is too feeble to know for sure, but when I was running VMS so long ago, much of the source code I read was in Bliss[16|32], a macro-like language that only DEC used. cheers, bob
Powered by blists - more mailing lists