Home BSidesLV Live Feed User Profile Explore Resources More Invite a Peer Sign Out How to use PeerlystSecure DropFAQAboutIn the NewsContact usPrivacy PolicyTerms of ServiceCareersSupport Write Post bellyknots 8m ago The Operating system security code basically the cpu has two languages. Dos and basic. Windows uses dos and linux uses basic! Ralf browns interrupt list details instructions for both languages. Furthermore, a code snippet from grey hat hacking book exploits Linux using gdb to show the cpu internal language in ram after following pointers up the stack. what is important here is that both operating systems use flat memory models of program security. The fmm is often always the easiest to implement however at cost of security. The virtual paged memory model offers far greater security but is often misunderstood. For the fmm offers a less intensive paging mechanism in order to access All of RAM. further more, both operating system use ring 0 (kernel) and ring 3 (userland). If any os as of yet has implimented driver rings 1 & 2 isn't documented. For you see with ring 0 in place with paging one can secure communications against all but those who can read machine code and also have an intimate knowledge of modem initialize code and low level transmission code. As someone who developed a working os title Lita Operating system, one has intimate knowledge of the complexity of multitasking and loading programs into ram for execution. So, remember, the hardware cpu is inheritly secure as root or default and raping the kernel from userland is IMPOSSIBLE. Invite secure communications operating systems operating system instructions hardware language exploits internal hacking windows program machine default kernel driver secure memory access linux modem model root code security. show more Normal Heading Sub Heading Minor Heading Code Increase Decrease Write a comment... Clear Comment Featured User Akshaya Venkateswara Raja Research Engineer at Singapore Management University Following Research Engineer (Android malware analysis) & Ambassador of Peerlyst Singapore meetups The 1st crowdsourced ebook from your infosec peers Peerlyst eBook Download now! More Posts by bellyknots Node n As Security bellyknotsJan 14, 2017 lacking bellyknotsOct 23, 2016 lacking bellyknotsOct 23, 2016 shotting.cc recent log post on auditing big data bellyknotsAug 26, 2016 we wrote a fuzzer bellyknotsAug 10, 2016 show more