4. Privilege Separation

  Рет қаралды 43,551

MIT OpenCourseWare

MIT OpenCourseWare

Күн бұрын

Пікірлер
@hoopssheaffer
@hoopssheaffer 7 жыл бұрын
Great lecturer, great content. Thanks MIT
@tetraphobie
@tetraphobie 8 күн бұрын
In case anyone else was wondering about the statement that "execute" on directories allows file lookup - see "filesystems/path-lookup.rst" in the kernel documentation mentioning it. Generally, the execute permission on a directory allows accessing its contents and changing the working directory to it, not just looking up path. Took me a while to make sense of all this.
@enkh-uchralganbat6450
@enkh-uchralganbat6450 2 жыл бұрын
trying to grasp the concept here but its difficult.
@veramentegina
@veramentegina 5 жыл бұрын
fascinating lecture. and i thought i knew unix well. thanks MIT!
@w3w3w3
@w3w3w3 4 жыл бұрын
great lecture
@IshanJain
@IshanJain 6 жыл бұрын
I think professor misunderstood something. At 1:09:46, He mentions each okcupid user won't correspond to a linux uid. The linux uid would be basically service id. So, Each of the different services(signup, forget password, etc) will be running under a different user. At 1:10:13, Some student, elaborated the advantages of aforementioned point. i.e. If one service is compromised, attacker can only get access to the service running under that user and everything else will be safe. Db proxy can have seperate instances running corresponding to each of the services that need db running under the same user as that service. At 1:10:42, He went off the tangent and said, Ok cupid probably didn't did that because there will be millions of process for each service and immediately after said, Spawning processes with appropriate user permission dynamically would be costly and perf would take a hit..
@CarlosPerez-ql6nu
@CarlosPerez-ql6nu 3 жыл бұрын
Strongest Okay this side of the Missisipodomis river
@egonkirchof
@egonkirchof 7 ай бұрын
The teacher looks like an actor I saw in moveis but don't remember his name
@小六-o7o
@小六-o7o 6 жыл бұрын
nice~
@CyberTeach
@CyberTeach Жыл бұрын
It's a good lecture, but it's almost like he didn't want to mention that peripheral devices are a necessary component to a working os.
@GregDubela
@GregDubela 5 жыл бұрын
:D
6. Capabilities
1:21:57
MIT OpenCourseWare
Рет қаралды 34 М.
12. Network Security
1:18:26
MIT OpenCourseWare
Рет қаралды 130 М.
Жездуха 42-серия
29:26
Million Show
Рет қаралды 2,6 МЛН
Sigma girl VS Sigma Error girl 2  #shorts #sigma
0:27
Jin and Hattie
Рет қаралды 124 МЛН
Хаги Ваги говорит разными голосами
0:22
Фани Хани
Рет қаралды 2,2 МЛН
Shocking Truths About the Irish Education System: Must-Know Tips & Insights !#voiceofrealstudent
15:11
Study Abroad AI (AI Powered Assistant | DLM)
Рет қаралды 118
14. SSL and HTTPS
1:18:18
MIT OpenCourseWare
Рет қаралды 225 М.
3. Buffer Overflow Exploits and Defenses
1:21:38
MIT OpenCourseWare
Рет қаралды 74 М.
MIT Introduction to Deep Learning | 6.S191
1:09:58
Alexander Amini
Рет қаралды 819 М.
Math Professor Fixes Projector Screen (April Fools Prank)
2:48
Matthew Weathers
Рет қаралды 139 МЛН
Lecture 1: Introduction
1:19:35
MIT 6.824: Distributed Systems
Рет қаралды 603 М.
20. Mobile Phone Security
1:22:00
MIT OpenCourseWare
Рет қаралды 36 М.
6.858 Fall 2014 Lecture 13: Kerberos
1:20:42
Nickolai Zeldovich
Рет қаралды 36 М.
Two MIT Professors ACCIDENTALLY discovered this simple SECRET TO LEARNING
5:10
Introduction to Computer Security - Information Security Lesson #1 of 12
41:47
Жездуха 42-серия
29:26
Million Show
Рет қаралды 2,6 МЛН