Talk:Security: Difference between revisions

From OSDev.wiki
Latest comment: 14 years ago by Messiahandrw in topic Ring 1 and 2
Jump to navigation Jump to search
Content deleted Content added
New page: This needs more stuff about high level security, such as managing users and how users own processes and files. Also handling considerations such as "how would 'sudo' or 'su' work?" will th...
 
No edit summary
Line 1: Line 1:
== Ring 1 and 2 ==
The description for ring 1 and 2 is: "They offer more protection, but not as much as ring 3." I feel that this is description is inappropriate for an OS dev website where you may find a user that has a purpose to use those ring levels. After a lot of searching I have failed to find any explination that clearly describes how the CPU handles those two rings (99% of cases it says 'they are rarely used' or 'they offer a little more protection than ring 0' but in exactly what ways?)

Having the description extended to include exact technical details of those ring levels would be highly appreciated. --[[User:Messiahandrw|Messiahandrw]] 08:16, 19 August 2009 (UTC)

== High level mechanisms ==

This needs more stuff about high level security, such as managing users and how users own processes and files. Also handling considerations such as "how would 'sudo' or 'su' work?" will there be sessions or just a simple process list? By what way will users actually login to your system? --[[User:Earlz|Earlz]] 04:46, 5 June 2009 (UTC)
This needs more stuff about high level security, such as managing users and how users own processes and files. Also handling considerations such as "how would 'sudo' or 'su' work?" will there be sessions or just a simple process list? By what way will users actually login to your system? --[[User:Earlz|Earlz]] 04:46, 5 June 2009 (UTC)

Revision as of 08:16, 19 August 2009

Ring 1 and 2

The description for ring 1 and 2 is: "They offer more protection, but not as much as ring 3." I feel that this is description is inappropriate for an OS dev website where you may find a user that has a purpose to use those ring levels. After a lot of searching I have failed to find any explination that clearly describes how the CPU handles those two rings (99% of cases it says 'they are rarely used' or 'they offer a little more protection than ring 0' but in exactly what ways?)

Having the description extended to include exact technical details of those ring levels would be highly appreciated. --Messiahandrw 08:16, 19 August 2009 (UTC)Reply

High level mechanisms

This needs more stuff about high level security, such as managing users and how users own processes and files. Also handling considerations such as "how would 'sudo' or 'su' work?" will there be sessions or just a simple process list? By what way will users actually login to your system? --Earlz 04:46, 5 June 2009 (UTC)Reply