Scanning Formats (TIFF vs. JPEG)
mcguire at neurotica.com
Sat Aug 19 10:32:43 CDT 2006
On Aug 18, 2006, at 3:55 PM, Alexey Toptygin wrote:
>>>>> [I'm intensely interested in this as to how it can be done
>>>>> to make applications in consumer devices "hacker hardened"]
>>>> Run VMS ;-)
>>> Bt, is that truly "hacker proof" or "hardened by obscurity"? :>
>> hacker proof. Just google for "vms defcon 9"
> The fact that no-one at defcon 9 knows VMS well enough to break into a
> VMS box says nothing of the security of VMS; it only says something
> about it's popularity.
Ahhh, somebody doesn't know how widely deployed VMS systems are, but
I won't point any fingers!
Cape Coral, FL
More information about the cctech