home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.sys.amiga.advocacy
- Path: sparky!uunet!zaphod.mps.ohio-state.edu!swrinde!gatech!concert!uvaarpa!murdoch!onyx.cs.Virginia.EDU!ccb8m
- From: ccb8m@onyx.cs.Virginia.EDU (Charles C. Bundy)
- Subject: Re: Future Amiga chipsets
- Message-ID: <1992Dec23.185031.5218@murdoch.acc.Virginia.EDU>
- Sender: usenet@murdoch.acc.Virginia.EDU
- Organization: University of Virginia Computer Science Department
- References: <38104@cbmvax.commodore.com> <1992Dec22.153943.20019@sol.ctr.columbia.edu>
- Date: Wed, 23 Dec 1992 18:50:31 GMT
- Lines: 35
-
- In article <1992Dec22.153943.20019@sol.ctr.columbia.edu> jerry@msi.com (Jerry Shekhel) writes:
- >Andy Finkel (andy@cbmvax.commodore.com) wrote:
- >: >
- >: >Right, but there's nothing preventing a nasty application from bypassing
- >: >your ROM routines and talking directly to the disk hardware, screwing things
- >: >up. On a system with properly-implemented memory protection, however, it's
- >: >much more difficult (if at all possible) to write such an application.
- >:
- >: If you are interested in the subject, you might want to do some research
- >: sometime. The Internet Worm is fairly interesting, since it ran
- >: on Unix boxes. (remember, Unix has protected memory).
- >:
- >
- >Yes, Unix has protected memory; that doesn't mean that it's bug free. The
- >Worm took advantage of bugs in Unix, and took immense knowledge and ingenuity
- >to create. On the other hand, a second-week computer science student would
- >have no problem intentionally screwing up a system without memory protection.
- >
-
- Bzzzt, sorry Jerry, the Unix worm didn't require "immense" knowledge of
- unix systems. Any undergrad could have written it. There was a backdoor
- in mail such that the author could log in with system privleges to assist
- the sysadmin with installation. If your root, yer almighty as far as
- unix is concerned, no clever hacks required to bypass memory protection,
- or fiddle with the kernel. The Morrison hack was a simple hunt and
- replicate.
-
- As far as the "second-week" student goes, anyone with no brains can frob
- the power switch on a unix/mini/mainframe. How's that for screwing up?
-
- Most second week students won't be using dynamic types (pointers) either,
- so yer memory protection is a moot point...
-
- Charles C. Bundy IV
- ccb8m@virginia.edu
-