Jump to content

Crowdstrike FUBAR Explained


RedBaird

Recommended Posts

  • Leader

I thought that some here might be interested.  

 

 

  • Like 5
  • 100 3
Link to comment
Share on other sites

Seems ITIL and other practices get ignored until companies have egg on their face. Should have been a non starter if they had safe guards in place. Well, at least that's my humble take on the situation, everyone makes mistakes but for a security company that's a lot. 

  • Like 1
Link to comment
Share on other sites

  • Leader
Posted (edited)

I can remember when Windows was said to have had 5 "rings", 0-4, but all the outside vendors wanted their programs to run on ring 1 and not 2, 3 or 4.

 

I don't know what they do these days. 😄 

 

ADDED:  Maybe I remembered wrongly.  This page says Windows uses 4 rings and that ring 0 is the "kernel mode" and that ring 3 is "user mode".  Linux has the same arrangement.

 

It looks like programs running in user-mode (ring 3) must issue calls to processes in rings 1 and 2 for input-output of various types.  😄 

 

What Are Rings in Operating Systems? | Baeldung on Computer Science

 

 

 

 

Edited by RedBaird
ADDED lines
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.