In article <[log in to unmask]>, [log in to unmask] (Steve n J. Madsen) writes: > I've never heard the security argument for VMS before. The one I've > most often heard is that VMS is, simply put, *rock* solid. If you want > hackability and portability and all of the things that go with UNIX, that's > what you use. If you have a system that simple *cannot* go down or heads > will roll, you use VMS. Actually, DEC tries to emphasize both of these points. VMS was designed from the ground up with security in mind. It comes in 2 flavors: regular VMS (C2 security) and SEVMS (B1 security) (If memory serves, only 2 systems have ever achieved A level security - one was a Honeywell system and I don't remember the other). Many of the security features now being added to Unix systems (shadow passwords, ACLs, etc.) have been features on VMS since Version 1.0. Reliability is another feature that DEC has been emphasizing lately. Occassionally, readers on comp.os.vms will have contests to see who's VMS system has been up the longest. Generally, the responses are measured in hundreds (if not thousands) of days with no downtime. In addition to OS stability, VMS clusters add addition reliability. You'll see many companies (such as Microsoft, Novell, etc.) use VMS for many of their core systems because of the 365x7 features of VMS. -- Kent Covert, Software Coordinator Miami Computing and Information Services Miami University, Oxford, OH [log in to unmask]