<p>Given the time frame when the specs on these were nailed down, I wonder if the version of vxworks is vulnerable to the root exploit via the wide open management port? :)</p>
<p>Thanks<br>
-Ben</p>
<div class="gmail_quote">On Aug 10, 2012 4:33 PM, "Lennart Sorensen" <<a href="mailto:lsorense-1wCw9BSqJbv44Nm34jS7GywD8/FfD2ys@public.gmane.org">lsorense@csclub.uwaterloo.ca</a>> wrote:<br type="attribution"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
On Fri, Aug 10, 2012 at 04:23:04PM -0400, Lance F. Squire wrote:<br>
> I'm just happy it's not just a wintel box. :P<br>
<br>
For some reason I had thought the rovers were running linux, but<br>
apparently they use vxworks.<br>
<br>
I guess real time was useful.<br>
<br>
--<br>
Len Sorensen<br>
--<br>
The Toronto Linux Users Group. Meetings: <a href="http://gtalug.org/" target="_blank">http://gtalug.org/</a><br>
TLUG requests: Linux topics, No HTML, wrap text below 80 columns<br>
How to UNSUBSCRIBE: <a href="http://gtalug.org/wiki/Mailing_lists" target="_blank">http://gtalug.org/wiki/Mailing_lists</a><br>
</blockquote></div>