[dundee] Linux Security & Botnet

gordon dunlop astrozubenel at googlemail.com
Fri Jan 25 23:29:28 GMT 2008


You are talking about ring 0 access, the great thing about
virtualization is that access is done within separate rings from 0,1
to 3 ( 3 is for 64 bit access), I will say nothing more as I do not
want to ruin my forthcoming talk.

Gordon

On 25/01/2008, Lee Hughes <toxicnaan at yahoo.co.uk> wrote:
> Well, a rootkit can be installed if you can get uid 0 (root) on the machine.
> Once you've got ring 0 access , you can do anything, without the aide
> of the kernel. It's just one of those things that monolithic kernels suffer
> from, there's a lot of code running in ring 0 , and if that code has
> exploits
> it's easy to take control of the entire system.
>
>
>
> _______________________________________________
> dundee GNU/Linux Users Group mailing list
> dundee at lists.lug.org.uk http://dundee.lug.org.uk
> https://mailman.lug.org.uk/mailman/listinfo/dundee
> Chat on IRC, #tlug on dundee.lug.org.uk
>
>
>
>  ________________________________
>  Sent from Yahoo! - a smarter inbox.
>
>
> _______________________________________________
> dundee GNU/Linux Users Group mailing list
> dundee at lists.lug.org.uk  http://dundee.lug.org.uk
> https://mailman.lug.org.uk/mailman/listinfo/dundee
> Chat on IRC, #tlug on dundee.lug.org.uk
>



More information about the dundee mailing list