<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://homeostasis.scs.carleton.ca/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jakebrown05</id>
	<title>Soma-notes - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://homeostasis.scs.carleton.ca/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jakebrown05"/>
	<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php/Special:Contributions/Jakebrown05"/>
	<updated>2026-05-02T07:45:35Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.42.1</generator>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_3&amp;diff=20526</id>
		<title>SystemsSec 2016W Lecture 3</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_3&amp;diff=20526"/>
		<updated>2016-01-15T18:37:35Z</updated>

		<summary type="html">&lt;p&gt;Jakebrown05: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Topics &amp;amp; Readings&lt;br /&gt;
&lt;br /&gt;
	- Notes&lt;br /&gt;
	- Chat&lt;br /&gt;
	- Names&lt;br /&gt;
	- Hacking Journal → Starting next week (Hand in weekly)&lt;br /&gt;
		- Grading&lt;br /&gt;
		- Brainstorming&lt;br /&gt;
&lt;br /&gt;
Class notes&lt;br /&gt;
&lt;br /&gt;
	Hacking Journal:	&lt;br /&gt;
&lt;br /&gt;
2 Note takers per class for participation marks. Make sure to say your name &lt;br /&gt;
before you talk in order to receive participation marks. Check e-mails for DISCORD app, for a chat room that is set up for this course to discuss Hacking topics.&lt;br /&gt;
	&lt;br /&gt;
	Hacking Journal (Record of PAIN)&lt;br /&gt;
		- Weekly hand-ins (3-4 hours a week)&lt;br /&gt;
		- Grades per week as follows:&lt;br /&gt;
                        0 → no Submission, 1 → Handed in, 2 → On the right track&lt;br /&gt;
		- End of semester the grade will be given based on journals as a whole.&lt;br /&gt;
		- Journal outline&lt;br /&gt;
- Date, Time, Durations, Description or explanation of hack or a development of your thinking behind the process chosen. (TXT File)&lt;br /&gt;
&lt;br /&gt;
	Brainstorming:&lt;br /&gt;
&lt;br /&gt;
          You may use the text book, tutorials,  and class exercises to get you started in order to teach how to get familiar the defenses.&lt;br /&gt;
	&lt;br /&gt;
	- Hacking opportunities (Breadth/Depth)&lt;br /&gt;
	- Class exercises/tutorials&lt;br /&gt;
        - Not just breaking into a system but rather how you can mess with a security feature. Playful fun hacks.&lt;br /&gt;
        - Not just tutorials, more so playing&lt;br /&gt;
        - Analysis of how a hack could be done (security analysis) but not only these&lt;br /&gt;
        - Not just one project all semester&lt;br /&gt;
        - You may extend on projects from other classes but not use the same thing.&lt;br /&gt;
        - Setting up of systems to be used for hacking opportunities is highly encouraged. Specifically Linux systems&lt;br /&gt;
        - The set up can be documented in your hacking journal&lt;br /&gt;
        - Making systems do what they are not supposed to do&lt;br /&gt;
        - Repository of exploits for many types of machines (METASPLOIT)&lt;br /&gt;
        - Many system specific exploits&lt;br /&gt;
        - Hackthissite.org is a good place to start for web security&lt;br /&gt;
        - We are aloud to run an old OS and play with its security systems (Old or New)&lt;br /&gt;
        - Weekly submissions will be marked based on progression throughout the course (Moving forward)&lt;br /&gt;
        - ***MONDAY WILL BE FIRST SUBMISSION OF HACKING JOURNAL [MIDNIGHT ON MONDAY]***&lt;br /&gt;
        - Expected to be submitted on time&lt;br /&gt;
        - Don’t be a developer be a hacker (Security Hacking)&lt;br /&gt;
        - Key loggers are boring, don’t make one unless Android version. If you are going to build something, then do it where little already exits.&lt;br /&gt;
        - Bug bounties (You keep the money!)&lt;br /&gt;
        - Do research till you cant find much info on a topic and then work from there.&lt;br /&gt;
        - Do not work on non-authorized systems&lt;br /&gt;
        - Teams are allowed but don’t be a freeloader&lt;br /&gt;
        - Go off the rails and collaborate!&lt;br /&gt;
        - Hoping that some students will find interesting vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Important Concepts&lt;br /&gt;
&lt;br /&gt;
	- Protection domains&lt;br /&gt;
        - separating O/S into boundaries so things don’t mess with other things unless the are supposed to. O/S’s try to separate things into different parts, Processes and resources. We don’t not want either to access everything on the     system.&lt;br /&gt;
&lt;br /&gt;
	- Access matrix&lt;br /&gt;
Processes| Resource&lt;br /&gt;
                   | A | B | C |		&lt;br /&gt;
 1   |             | r | rw| w |&lt;br /&gt;
 2   |             | r | r | w |&lt;br /&gt;
 3   |             |   | rw| r |&lt;br /&gt;
&lt;br /&gt;
	This matrix will be very sparse. We want something to aggregate.&lt;br /&gt;
	We need to aggregate process and resources. This is normally not enough.		&lt;br /&gt;
	- Capabilities vs ACL’s (Access Control Lists)&lt;br /&gt;
	&lt;br /&gt;
	Capabilities: Each process has a list of what it can access&lt;br /&gt;
&lt;br /&gt;
        ACL’s: A list associated with each object that contains all the processes that can access that object.&lt;br /&gt;
&lt;br /&gt;
	Unix permissions are very impoverished ACL.&lt;br /&gt;
	&lt;br /&gt;
	* A process should not be able to change its own capabilities&lt;br /&gt;
&lt;br /&gt;
	- But why do this at all?&lt;br /&gt;
		- Rules and restrictions but why?&lt;br /&gt;
		- Done so programs don’t leak info of one user to another.&lt;br /&gt;
		- i.e. Top secret info&lt;br /&gt;
		- How do we make sure no one cheat’s?&lt;br /&gt;
&lt;br /&gt;
	Mandatory Access Control (MAC)&lt;br /&gt;
		- Permissions are set and stone&lt;br /&gt;
		- Cannot be changed at run time&lt;br /&gt;
		- Must boot into special mode with password&lt;br /&gt;
		- Rigid system&lt;br /&gt;
		- SELINUX&lt;br /&gt;
		- Root can’t do everything!&lt;br /&gt;
	&lt;br /&gt;
	Discretionary Access Control (DAC)&lt;br /&gt;
		- Most of us use these systems&lt;br /&gt;
		- Users have the ability to change things&lt;br /&gt;
		- Windows and Linux are discretionary&lt;br /&gt;
&lt;br /&gt;
	* Assignment next week *&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is all from chapter 2 information from the textbook. Assignments will be confirmation of tests.&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
       - Reference Monitor&lt;br /&gt;
	&lt;br /&gt;
		How do we keep programs from breaking these rules?&lt;br /&gt;
                         - Make sure all rule enforcement runs through a small program “The Rule Enforcer”&lt;br /&gt;
                         - You cannot by pass or mess with it&lt;br /&gt;
                         - There must be no bugs therefor elaborate testing must be done.&lt;br /&gt;
                         - Forbid inter communications between processes&lt;br /&gt;
                         - What about covert channels?&lt;br /&gt;
&lt;br /&gt;
	- MULTICS&lt;/div&gt;</summary>
		<author><name>Jakebrown05</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_3&amp;diff=20525</id>
		<title>SystemsSec 2016W Lecture 3</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_3&amp;diff=20525"/>
		<updated>2016-01-15T18:37:18Z</updated>

		<summary type="html">&lt;p&gt;Jakebrown05: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Topics &amp;amp; Readings&lt;br /&gt;
&lt;br /&gt;
	- Notes&lt;br /&gt;
	- Chat&lt;br /&gt;
	- Names&lt;br /&gt;
	- Hacking Journal → Starting next week (Hand in weekly)&lt;br /&gt;
		- Grading&lt;br /&gt;
		- Brainstorming&lt;br /&gt;
&lt;br /&gt;
Class notes&lt;br /&gt;
&lt;br /&gt;
	Hacking Journal:	&lt;br /&gt;
&lt;br /&gt;
2 Note takers per class for participation marks. Make sure to say your name &lt;br /&gt;
before you talk in order to receive participation marks. Check e-mails for DISCORD app, for a chat room that is set up for this course to discuss Hacking topics.&lt;br /&gt;
	&lt;br /&gt;
	Hacking Journal (Record of PAIN)&lt;br /&gt;
		- Weekly hand-ins (3-4 hours a week)&lt;br /&gt;
		- Grades per week as follows:&lt;br /&gt;
                        0 → no Submission, 1 → Handed in, 2 → On the right track&lt;br /&gt;
		- End of semester the grade will be given based on journals as a whole.&lt;br /&gt;
		- Journal outline&lt;br /&gt;
- Date, Time, Durations, Description or explanation of hack or a development of your thinking behind the process chosen. (TXT File)&lt;br /&gt;
&lt;br /&gt;
	Brainstorming:&lt;br /&gt;
&lt;br /&gt;
          You may use the text book, tutorials,  and class exercises to get you started in order to teach how to get familiar the defenses.&lt;br /&gt;
	&lt;br /&gt;
	- Hacking opportunities (Breadth/Depth)&lt;br /&gt;
	- Class exercises/tutorials&lt;br /&gt;
        - Not just breaking into a system but rather how you can mess with a security feature. Playful fun hacks.&lt;br /&gt;
        - Not just tutorials, more so playing&lt;br /&gt;
        - Analysis of how a hack could be done (security analysis) but not only these&lt;br /&gt;
        - Not just one project all semester&lt;br /&gt;
        - You may extend on projects from other classes but not use the same thing.&lt;br /&gt;
        - Setting up of systems to be used for hacking opportunities is highly encouraged. Specifically Linux systems&lt;br /&gt;
        - The set up can be documented in your hacking journal&lt;br /&gt;
        - Making systems do what they are not supposed to do&lt;br /&gt;
        - Repository of exploits for many types of machines (METASPLOIT)&lt;br /&gt;
        - Many system specific exploits&lt;br /&gt;
        - Hackthissite.org is a good place to start for web security&lt;br /&gt;
        - We are aloud to run an old OS and play with its security systems (Old or New)&lt;br /&gt;
        - Weekly submissions will be marked based on progression throughout the course (Moving forward)&lt;br /&gt;
        - ***MONDAY WILL BE FIRST SUBMISSION OF HACKING JOURNAL [MIDNIGHT ON MONDAY]***&lt;br /&gt;
        - Expected to be submitted on time&lt;br /&gt;
        - Don’t be a developer be a hacker (Security Hacking)&lt;br /&gt;
        - Key loggers are boring, don’t make one unless Android version. If you are going to build something, then do it where little already exits.&lt;br /&gt;
        - Bug bounties (You keep the money!)&lt;br /&gt;
        - Do research till you cant find much info on a topic and then work from there.&lt;br /&gt;
        - Do not work on non-authorized systems&lt;br /&gt;
        - Teams are allowed but don’t be a freeloader&lt;br /&gt;
        - Go off the rails and collaborate!&lt;br /&gt;
        - Hoping that some students will find interesting vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Important Concepts&lt;br /&gt;
&lt;br /&gt;
	- Protection domains&lt;br /&gt;
        - separating O/S into boundaries so things don’t mess with other things unless the are supposed to. O/S’s try to separate things into different parts, Processes and resources. We don’t not want either to access everything on the     system.&lt;br /&gt;
&lt;br /&gt;
	- Access matrix&lt;br /&gt;
Processes| Resource&lt;br /&gt;
                   | A | B | C | . | . | . |		&lt;br /&gt;
 1   |             | r | rw| w |&lt;br /&gt;
 2   |             | r | r | w|&lt;br /&gt;
 3   |             |   | rw| r  |&lt;br /&gt;
&lt;br /&gt;
	This matrix will be very sparse. We want something to aggregate.&lt;br /&gt;
	We need to aggregate process and resources. This is normally not enough.		&lt;br /&gt;
	- Capabilities vs ACL’s (Access Control Lists)&lt;br /&gt;
	&lt;br /&gt;
	Capabilities: Each process has a list of what it can access&lt;br /&gt;
&lt;br /&gt;
        ACL’s: A list associated with each object that contains all the processes that can access that object.&lt;br /&gt;
&lt;br /&gt;
	Unix permissions are very impoverished ACL.&lt;br /&gt;
	&lt;br /&gt;
	* A process should not be able to change its own capabilities&lt;br /&gt;
&lt;br /&gt;
	- But why do this at all?&lt;br /&gt;
		- Rules and restrictions but why?&lt;br /&gt;
		- Done so programs don’t leak info of one user to another.&lt;br /&gt;
		- i.e. Top secret info&lt;br /&gt;
		- How do we make sure no one cheat’s?&lt;br /&gt;
&lt;br /&gt;
	Mandatory Access Control (MAC)&lt;br /&gt;
		- Permissions are set and stone&lt;br /&gt;
		- Cannot be changed at run time&lt;br /&gt;
		- Must boot into special mode with password&lt;br /&gt;
		- Rigid system&lt;br /&gt;
		- SELINUX&lt;br /&gt;
		- Root can’t do everything!&lt;br /&gt;
	&lt;br /&gt;
	Discretionary Access Control (DAC)&lt;br /&gt;
		- Most of us use these systems&lt;br /&gt;
		- Users have the ability to change things&lt;br /&gt;
		- Windows and Linux are discretionary&lt;br /&gt;
&lt;br /&gt;
	* Assignment next week *&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is all from chapter 2 information from the textbook. Assignments will be confirmation of tests.&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
       - Reference Monitor&lt;br /&gt;
	&lt;br /&gt;
		How do we keep programs from breaking these rules?&lt;br /&gt;
                         - Make sure all rule enforcement runs through a small program “The Rule Enforcer”&lt;br /&gt;
                         - You cannot by pass or mess with it&lt;br /&gt;
                         - There must be no bugs therefor elaborate testing must be done.&lt;br /&gt;
                         - Forbid inter communications between processes&lt;br /&gt;
                         - What about covert channels?&lt;br /&gt;
&lt;br /&gt;
	- MULTICS&lt;/div&gt;</summary>
		<author><name>Jakebrown05</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_3&amp;diff=20524</id>
		<title>SystemsSec 2016W Lecture 3</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_3&amp;diff=20524"/>
		<updated>2016-01-15T18:37:00Z</updated>

		<summary type="html">&lt;p&gt;Jakebrown05: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Topics &amp;amp; Readings&lt;br /&gt;
&lt;br /&gt;
	- Notes&lt;br /&gt;
	- Chat&lt;br /&gt;
	- Names&lt;br /&gt;
	- Hacking Journal → Starting next week (Hand in weekly)&lt;br /&gt;
		- Grading&lt;br /&gt;
		- Brainstorming&lt;br /&gt;
&lt;br /&gt;
Class notes&lt;br /&gt;
&lt;br /&gt;
	Hacking Journal:	&lt;br /&gt;
&lt;br /&gt;
2 Note takers per class for participation marks. Make sure to say your name &lt;br /&gt;
before you talk in order to receive participation marks. Check e-mails for DISCORD app, for a chat room that is set up for this course to discuss Hacking topics.&lt;br /&gt;
	&lt;br /&gt;
	Hacking Journal (Record of PAIN)&lt;br /&gt;
		- Weekly hand-ins (3-4 hours a week)&lt;br /&gt;
		- Grades per week as follows:&lt;br /&gt;
                        0 → no Submission, 1 → Handed in, 2 → On the right track&lt;br /&gt;
		- End of semester the grade will be given based on journals as a whole.&lt;br /&gt;
		- Journal outline&lt;br /&gt;
- Date, Time, Durations, Description or explanation of hack or a development of your thinking behind the process chosen. (TXT File)&lt;br /&gt;
&lt;br /&gt;
	Brainstorming:&lt;br /&gt;
&lt;br /&gt;
          You may use the text book, tutorials,  and class exercises to get you started in order to teach how to get familiar the defenses.&lt;br /&gt;
	&lt;br /&gt;
	- Hacking opportunities (Breadth/Depth)&lt;br /&gt;
	- Class exercises/tutorials&lt;br /&gt;
        - Not just breaking into a system but rather how you can mess with a security feature. Playful fun hacks.&lt;br /&gt;
        - Not just tutorials, more so playing&lt;br /&gt;
        - Analysis of how a hack could be done (security analysis) but not only these&lt;br /&gt;
        - Not just one project all semester&lt;br /&gt;
        - You may extend on projects from other classes but not use the same thing.&lt;br /&gt;
        - Setting up of systems to be used for hacking opportunities is highly encouraged. Specifically Linux systems&lt;br /&gt;
        - The set up can be documented in your hacking journal&lt;br /&gt;
        - Making systems do what they are not supposed to do&lt;br /&gt;
        - Repository of exploits for many types of machines (METASPLOIT)&lt;br /&gt;
        - Many system specific exploits&lt;br /&gt;
        - Hackthissite.org is a good place to start for web security&lt;br /&gt;
        - We are aloud to run an old OS and play with its security systems (Old or New)&lt;br /&gt;
        - Weekly submissions will be marked based on progression throughout the course (Moving forward)&lt;br /&gt;
        - ***MONDAY WILL BE FIRST SUBMISSION OF HACKING JOURNAL [MIDNIGHT ON MONDAY]***&lt;br /&gt;
        - Expected to be submitted on time&lt;br /&gt;
        - Don’t be a developer be a hacker (Security Hacking)&lt;br /&gt;
        - Key loggers are boring, don’t make one unless Android version. If you are going to build something, then do it where little already exits.&lt;br /&gt;
        - Bug bounties (You keep the money!)&lt;br /&gt;
        - Do research till you cant find much info on a topic and then work from there.&lt;br /&gt;
        - Do not work on non-authorized systems&lt;br /&gt;
        - Teams are allowed but don’t be a freeloader&lt;br /&gt;
        - Go off the rails and collaborate!&lt;br /&gt;
        - Hoping that some students will find interesting vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Important Concepts&lt;br /&gt;
&lt;br /&gt;
	- Protection domains&lt;br /&gt;
        - separating O/S into boundaries so things don’t mess with other things unless the are supposed to. O/S’s try to separate things into different parts, Processes and resources. We don’t not want either to access everything on the     system.&lt;br /&gt;
&lt;br /&gt;
	- Access matrix&lt;br /&gt;
Processes| Resource&lt;br /&gt;
                   | A | B | C | . | . | . |		&lt;br /&gt;
 1   |             | r | rw | w |&lt;br /&gt;
 2   |             | r | r | w|&lt;br /&gt;
 3   |             |   | rw | r  |&lt;br /&gt;
&lt;br /&gt;
	This matrix will be very sparse. We want something to aggregate.&lt;br /&gt;
	We need to aggregate process and resources. This is normally not enough.		&lt;br /&gt;
	- Capabilities vs ACL’s (Access Control Lists)&lt;br /&gt;
	&lt;br /&gt;
	Capabilities: Each process has a list of what it can access&lt;br /&gt;
&lt;br /&gt;
        ACL’s: A list associated with each object that contains all the processes that can access that object.&lt;br /&gt;
&lt;br /&gt;
	Unix permissions are very impoverished ACL.&lt;br /&gt;
	&lt;br /&gt;
	* A process should not be able to change its own capabilities&lt;br /&gt;
&lt;br /&gt;
	- But why do this at all?&lt;br /&gt;
		- Rules and restrictions but why?&lt;br /&gt;
		- Done so programs don’t leak info of one user to another.&lt;br /&gt;
		- i.e. Top secret info&lt;br /&gt;
		- How do we make sure no one cheat’s?&lt;br /&gt;
&lt;br /&gt;
	Mandatory Access Control (MAC)&lt;br /&gt;
		- Permissions are set and stone&lt;br /&gt;
		- Cannot be changed at run time&lt;br /&gt;
		- Must boot into special mode with password&lt;br /&gt;
		- Rigid system&lt;br /&gt;
		- SELINUX&lt;br /&gt;
		- Root can’t do everything!&lt;br /&gt;
	&lt;br /&gt;
	Discretionary Access Control (DAC)&lt;br /&gt;
		- Most of us use these systems&lt;br /&gt;
		- Users have the ability to change things&lt;br /&gt;
		- Windows and Linux are discretionary&lt;br /&gt;
&lt;br /&gt;
	* Assignment next week *&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is all from chapter 2 information from the textbook. Assignments will be confirmation of tests.&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
       - Reference Monitor&lt;br /&gt;
	&lt;br /&gt;
		How do we keep programs from breaking these rules?&lt;br /&gt;
                         - Make sure all rule enforcement runs through a small program “The Rule Enforcer”&lt;br /&gt;
                         - You cannot by pass or mess with it&lt;br /&gt;
                         - There must be no bugs therefor elaborate testing must be done.&lt;br /&gt;
                         - Forbid inter communications between processes&lt;br /&gt;
                         - What about covert channels?&lt;br /&gt;
&lt;br /&gt;
	- MULTICS&lt;/div&gt;</summary>
		<author><name>Jakebrown05</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_3&amp;diff=20523</id>
		<title>SystemsSec 2016W Lecture 3</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_3&amp;diff=20523"/>
		<updated>2016-01-15T18:36:51Z</updated>

		<summary type="html">&lt;p&gt;Jakebrown05: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Topics &amp;amp; Readings&lt;br /&gt;
&lt;br /&gt;
	- Notes&lt;br /&gt;
	- Chat&lt;br /&gt;
	- Names&lt;br /&gt;
	- Hacking Journal → Starting next week (Hand in weekly)&lt;br /&gt;
		- Grading&lt;br /&gt;
		- Brainstorming&lt;br /&gt;
&lt;br /&gt;
Class notes&lt;br /&gt;
&lt;br /&gt;
	Hacking Journal:	&lt;br /&gt;
&lt;br /&gt;
2 Note takers per class for participation marks. Make sure to say your name &lt;br /&gt;
before you talk in order to receive participation marks. Check e-mails for DISCORD app, for a chat room that is set up for this course to discuss Hacking topics.&lt;br /&gt;
	&lt;br /&gt;
	Hacking Journal (Record of PAIN)&lt;br /&gt;
		- Weekly hand-ins (3-4 hours a week)&lt;br /&gt;
		- Grades per week as follows:&lt;br /&gt;
                        0 → no Submission, 1 → Handed in, 2 → On the right track&lt;br /&gt;
		- End of semester the grade will be given based on journals as a whole.&lt;br /&gt;
		- Journal outline&lt;br /&gt;
- Date, Time, Durations, Description or explanation of hack or a development of your thinking behind the process chosen. (TXT File)&lt;br /&gt;
&lt;br /&gt;
	Brainstorming:&lt;br /&gt;
&lt;br /&gt;
          You may use the text book, tutorials,  and class exercises to get you started in order to teach how to get familiar the defenses.&lt;br /&gt;
	&lt;br /&gt;
	- Hacking opportunities (Breadth/Depth)&lt;br /&gt;
	- Class exercises/tutorials&lt;br /&gt;
        - Not just breaking into a system but rather how you can mess with a security feature. Playful fun hacks.&lt;br /&gt;
        - Not just tutorials, more so playing&lt;br /&gt;
        - Analysis of how a hack could be done (security analysis) but not only these&lt;br /&gt;
        - Not just one project all semester&lt;br /&gt;
        - You may extend on projects from other classes but not use the same thing.&lt;br /&gt;
        - Setting up of systems to be used for hacking opportunities is highly encouraged. Specifically Linux systems&lt;br /&gt;
        - The set up can be documented in your hacking journal&lt;br /&gt;
        - Making systems do what they are not supposed to do&lt;br /&gt;
        - Repository of exploits for many types of machines (METASPLOIT)&lt;br /&gt;
        - Many system specific exploits&lt;br /&gt;
        - Hackthissite.org is a good place to start for web security&lt;br /&gt;
        - We are aloud to run an old OS and play with its security systems (Old or New)&lt;br /&gt;
        - Weekly submissions will be marked based on progression throughout the course (Moving forward)&lt;br /&gt;
        - ***MONDAY WILL BE FIRST SUBMISSION OF HACKING JOURNAL [MIDNIGHT ON MONDAY]***&lt;br /&gt;
        - Expected to be submitted on time&lt;br /&gt;
        - Don’t be a developer be a hacker (Security Hacking)&lt;br /&gt;
        - Key loggers are boring, don’t make one unless Android version. If you are going to build something, then do it where little already exits.&lt;br /&gt;
        - Bug bounties (You keep the money!)&lt;br /&gt;
        - Do research till you cant find much info on a topic and then work from there.&lt;br /&gt;
        - Do not work on non-authorized systems&lt;br /&gt;
        - Teams are allowed but don’t be a freeloader&lt;br /&gt;
        - Go off the rails and collaborate!&lt;br /&gt;
        - Hoping that some students will find interesting vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Important Concepts&lt;br /&gt;
&lt;br /&gt;
	- Protection domains&lt;br /&gt;
        - separating O/S into boundaries so things don’t mess with other things unless the are supposed to. O/S’s try to separate things into different parts, Processes and resources. We don’t not want either to access everything on the     system.&lt;br /&gt;
&lt;br /&gt;
	- Access matrix&lt;br /&gt;
Processes| Resource&lt;br /&gt;
                   |A | B | C | . | . | . |		&lt;br /&gt;
 1   |             | r | rw | w |&lt;br /&gt;
 2   |             | r | r | w|&lt;br /&gt;
 3   |             |   | rw | r  |&lt;br /&gt;
&lt;br /&gt;
	This matrix will be very sparse. We want something to aggregate.&lt;br /&gt;
	We need to aggregate process and resources. This is normally not enough.		&lt;br /&gt;
	- Capabilities vs ACL’s (Access Control Lists)&lt;br /&gt;
	&lt;br /&gt;
	Capabilities: Each process has a list of what it can access&lt;br /&gt;
&lt;br /&gt;
        ACL’s: A list associated with each object that contains all the processes that can access that object.&lt;br /&gt;
&lt;br /&gt;
	Unix permissions are very impoverished ACL.&lt;br /&gt;
	&lt;br /&gt;
	* A process should not be able to change its own capabilities&lt;br /&gt;
&lt;br /&gt;
	- But why do this at all?&lt;br /&gt;
		- Rules and restrictions but why?&lt;br /&gt;
		- Done so programs don’t leak info of one user to another.&lt;br /&gt;
		- i.e. Top secret info&lt;br /&gt;
		- How do we make sure no one cheat’s?&lt;br /&gt;
&lt;br /&gt;
	Mandatory Access Control (MAC)&lt;br /&gt;
		- Permissions are set and stone&lt;br /&gt;
		- Cannot be changed at run time&lt;br /&gt;
		- Must boot into special mode with password&lt;br /&gt;
		- Rigid system&lt;br /&gt;
		- SELINUX&lt;br /&gt;
		- Root can’t do everything!&lt;br /&gt;
	&lt;br /&gt;
	Discretionary Access Control (DAC)&lt;br /&gt;
		- Most of us use these systems&lt;br /&gt;
		- Users have the ability to change things&lt;br /&gt;
		- Windows and Linux are discretionary&lt;br /&gt;
&lt;br /&gt;
	* Assignment next week *&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is all from chapter 2 information from the textbook. Assignments will be confirmation of tests.&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
       - Reference Monitor&lt;br /&gt;
	&lt;br /&gt;
		How do we keep programs from breaking these rules?&lt;br /&gt;
                         - Make sure all rule enforcement runs through a small program “The Rule Enforcer”&lt;br /&gt;
                         - You cannot by pass or mess with it&lt;br /&gt;
                         - There must be no bugs therefor elaborate testing must be done.&lt;br /&gt;
                         - Forbid inter communications between processes&lt;br /&gt;
                         - What about covert channels?&lt;br /&gt;
&lt;br /&gt;
	- MULTICS&lt;/div&gt;</summary>
		<author><name>Jakebrown05</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_3&amp;diff=20522</id>
		<title>SystemsSec 2016W Lecture 3</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_3&amp;diff=20522"/>
		<updated>2016-01-15T18:36:42Z</updated>

		<summary type="html">&lt;p&gt;Jakebrown05: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Topics &amp;amp; Readings&lt;br /&gt;
&lt;br /&gt;
	- Notes&lt;br /&gt;
	- Chat&lt;br /&gt;
	- Names&lt;br /&gt;
	- Hacking Journal → Starting next week (Hand in weekly)&lt;br /&gt;
		- Grading&lt;br /&gt;
		- Brainstorming&lt;br /&gt;
&lt;br /&gt;
Class notes&lt;br /&gt;
&lt;br /&gt;
	Hacking Journal:	&lt;br /&gt;
&lt;br /&gt;
2 Note takers per class for participation marks. Make sure to say your name &lt;br /&gt;
before you talk in order to receive participation marks. Check e-mails for DISCORD app, for a chat room that is set up for this course to discuss Hacking topics.&lt;br /&gt;
	&lt;br /&gt;
	Hacking Journal (Record of PAIN)&lt;br /&gt;
		- Weekly hand-ins (3-4 hours a week)&lt;br /&gt;
		- Grades per week as follows:&lt;br /&gt;
                        0 → no Submission, 1 → Handed in, 2 → On the right track&lt;br /&gt;
		- End of semester the grade will be given based on journals as a whole.&lt;br /&gt;
		- Journal outline&lt;br /&gt;
- Date, Time, Durations, Description or explanation of hack or a development of your thinking behind the process chosen. (TXT File)&lt;br /&gt;
&lt;br /&gt;
	Brainstorming:&lt;br /&gt;
&lt;br /&gt;
          You may use the text book, tutorials,  and class exercises to get you started in order to teach how to get familiar the defenses.&lt;br /&gt;
	&lt;br /&gt;
	- Hacking opportunities (Breadth/Depth)&lt;br /&gt;
	- Class exercises/tutorials&lt;br /&gt;
        - Not just breaking into a system but rather how you can mess with a security feature. Playful fun hacks.&lt;br /&gt;
        - Not just tutorials, more so playing&lt;br /&gt;
        - Analysis of how a hack could be done (security analysis) but not only these&lt;br /&gt;
        - Not just one project all semester&lt;br /&gt;
        - You may extend on projects from other classes but not use the same thing.&lt;br /&gt;
        - Setting up of systems to be used for hacking opportunities is highly encouraged. Specifically Linux systems&lt;br /&gt;
        - The set up can be documented in your hacking journal&lt;br /&gt;
        - Making systems do what they are not supposed to do&lt;br /&gt;
        - Repository of exploits for many types of machines (METASPLOIT)&lt;br /&gt;
        - Many system specific exploits&lt;br /&gt;
        - Hackthissite.org is a good place to start for web security&lt;br /&gt;
        - We are aloud to run an old OS and play with its security systems (Old or New)&lt;br /&gt;
        - Weekly submissions will be marked based on progression throughout the course (Moving forward)&lt;br /&gt;
        - ***MONDAY WILL BE FIRST SUBMISSION OF HACKING JOURNAL [MIDNIGHT ON MONDAY]***&lt;br /&gt;
        - Expected to be submitted on time&lt;br /&gt;
        - Don’t be a developer be a hacker (Security Hacking)&lt;br /&gt;
        - Key loggers are boring, don’t make one unless Android version. If you are going to build something, then do it where little already exits.&lt;br /&gt;
        - Bug bounties (You keep the money!)&lt;br /&gt;
        - Do research till you cant find much info on a topic and then work from there.&lt;br /&gt;
        - Do not work on non-authorized systems&lt;br /&gt;
        - Teams are allowed but don’t be a freeloader&lt;br /&gt;
        - Go off the rails and collaborate!&lt;br /&gt;
        - Hoping that some students will find interesting vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Important Concepts&lt;br /&gt;
&lt;br /&gt;
	- Protection domains&lt;br /&gt;
        - separating O/S into boundaries so things don’t mess with other things unless the are supposed to. O/S’s try to separate things into different parts, Processes and resources. We don’t not want either to access everything on the     system.&lt;br /&gt;
&lt;br /&gt;
	- Access matrix&lt;br /&gt;
Processes| Resource&lt;br /&gt;
                   |A| B | C | . | . | . |		&lt;br /&gt;
 1   |             | r | rw | w |&lt;br /&gt;
 2   |             | r | r | w|&lt;br /&gt;
 3   |             |   | rw | r  |&lt;br /&gt;
&lt;br /&gt;
	This matrix will be very sparse. We want something to aggregate.&lt;br /&gt;
	We need to aggregate process and resources. This is normally not enough.		&lt;br /&gt;
	- Capabilities vs ACL’s (Access Control Lists)&lt;br /&gt;
	&lt;br /&gt;
	Capabilities: Each process has a list of what it can access&lt;br /&gt;
&lt;br /&gt;
        ACL’s: A list associated with each object that contains all the processes that can access that object.&lt;br /&gt;
&lt;br /&gt;
	Unix permissions are very impoverished ACL.&lt;br /&gt;
	&lt;br /&gt;
	* A process should not be able to change its own capabilities&lt;br /&gt;
&lt;br /&gt;
	- But why do this at all?&lt;br /&gt;
		- Rules and restrictions but why?&lt;br /&gt;
		- Done so programs don’t leak info of one user to another.&lt;br /&gt;
		- i.e. Top secret info&lt;br /&gt;
		- How do we make sure no one cheat’s?&lt;br /&gt;
&lt;br /&gt;
	Mandatory Access Control (MAC)&lt;br /&gt;
		- Permissions are set and stone&lt;br /&gt;
		- Cannot be changed at run time&lt;br /&gt;
		- Must boot into special mode with password&lt;br /&gt;
		- Rigid system&lt;br /&gt;
		- SELINUX&lt;br /&gt;
		- Root can’t do everything!&lt;br /&gt;
	&lt;br /&gt;
	Discretionary Access Control (DAC)&lt;br /&gt;
		- Most of us use these systems&lt;br /&gt;
		- Users have the ability to change things&lt;br /&gt;
		- Windows and Linux are discretionary&lt;br /&gt;
&lt;br /&gt;
	* Assignment next week *&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is all from chapter 2 information from the textbook. Assignments will be confirmation of tests.&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
       - Reference Monitor&lt;br /&gt;
	&lt;br /&gt;
		How do we keep programs from breaking these rules?&lt;br /&gt;
                         - Make sure all rule enforcement runs through a small program “The Rule Enforcer”&lt;br /&gt;
                         - You cannot by pass or mess with it&lt;br /&gt;
                         - There must be no bugs therefor elaborate testing must be done.&lt;br /&gt;
                         - Forbid inter communications between processes&lt;br /&gt;
                         - What about covert channels?&lt;br /&gt;
&lt;br /&gt;
	- MULTICS&lt;/div&gt;</summary>
		<author><name>Jakebrown05</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_3&amp;diff=20521</id>
		<title>SystemsSec 2016W Lecture 3</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_3&amp;diff=20521"/>
		<updated>2016-01-15T18:36:32Z</updated>

		<summary type="html">&lt;p&gt;Jakebrown05: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Topics &amp;amp; Readings&lt;br /&gt;
&lt;br /&gt;
	- Notes&lt;br /&gt;
	- Chat&lt;br /&gt;
	- Names&lt;br /&gt;
	- Hacking Journal → Starting next week (Hand in weekly)&lt;br /&gt;
		- Grading&lt;br /&gt;
		- Brainstorming&lt;br /&gt;
&lt;br /&gt;
Class notes&lt;br /&gt;
&lt;br /&gt;
	Hacking Journal:	&lt;br /&gt;
&lt;br /&gt;
2 Note takers per class for participation marks. Make sure to say your name &lt;br /&gt;
before you talk in order to receive participation marks. Check e-mails for DISCORD app, for a chat room that is set up for this course to discuss Hacking topics.&lt;br /&gt;
	&lt;br /&gt;
	Hacking Journal (Record of PAIN)&lt;br /&gt;
		- Weekly hand-ins (3-4 hours a week)&lt;br /&gt;
		- Grades per week as follows:&lt;br /&gt;
                        0 → no Submission, 1 → Handed in, 2 → On the right track&lt;br /&gt;
		- End of semester the grade will be given based on journals as a whole.&lt;br /&gt;
		- Journal outline&lt;br /&gt;
- Date, Time, Durations, Description or explanation of hack or a development of your thinking behind the process chosen. (TXT File)&lt;br /&gt;
&lt;br /&gt;
	Brainstorming:&lt;br /&gt;
&lt;br /&gt;
          You may use the text book, tutorials,  and class exercises to get you started in order to teach how to get familiar the defenses.&lt;br /&gt;
	&lt;br /&gt;
	- Hacking opportunities (Breadth/Depth)&lt;br /&gt;
	- Class exercises/tutorials&lt;br /&gt;
        - Not just breaking into a system but rather how you can mess with a security feature. Playful fun hacks.&lt;br /&gt;
        - Not just tutorials, more so playing&lt;br /&gt;
        - Analysis of how a hack could be done (security analysis) but not only these&lt;br /&gt;
        - Not just one project all semester&lt;br /&gt;
        - You may extend on projects from other classes but not use the same thing.&lt;br /&gt;
        - Setting up of systems to be used for hacking opportunities is highly encouraged. Specifically Linux systems&lt;br /&gt;
        - The set up can be documented in your hacking journal&lt;br /&gt;
        - Making systems do what they are not supposed to do&lt;br /&gt;
        - Repository of exploits for many types of machines (METASPLOIT)&lt;br /&gt;
        - Many system specific exploits&lt;br /&gt;
        - Hackthissite.org is a good place to start for web security&lt;br /&gt;
        - We are aloud to run an old OS and play with its security systems (Old or New)&lt;br /&gt;
        - Weekly submissions will be marked based on progression throughout the course (Moving forward)&lt;br /&gt;
        - ***MONDAY WILL BE FIRST SUBMISSION OF HACKING JOURNAL [MIDNIGHT ON MONDAY]***&lt;br /&gt;
        - Expected to be submitted on time&lt;br /&gt;
        - Don’t be a developer be a hacker (Security Hacking)&lt;br /&gt;
        - Key loggers are boring, don’t make one unless Android version. If you are going to build something, then do it where little already exits.&lt;br /&gt;
        - Bug bounties (You keep the money!)&lt;br /&gt;
        - Do research till you cant find much info on a topic and then work from there.&lt;br /&gt;
        - Do not work on non-authorized systems&lt;br /&gt;
        - Teams are allowed but don’t be a freeloader&lt;br /&gt;
        - Go off the rails and collaborate!&lt;br /&gt;
        - Hoping that some students will find interesting vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Important Concepts&lt;br /&gt;
&lt;br /&gt;
	- Protection domains&lt;br /&gt;
        - separating O/S into boundaries so things don’t mess with other things unless the are supposed to. O/S’s try to separate things into different parts, Processes and resources. We don’t not want either to access everything on the     system.&lt;br /&gt;
&lt;br /&gt;
	- Access matrix&lt;br /&gt;
Processes| Resource&lt;br /&gt;
                    | A| B | C | . | . | . |		&lt;br /&gt;
 1   |             | r | rw | w |&lt;br /&gt;
 2   |             | r | r | w|&lt;br /&gt;
 3   |             |   | rw | r  |&lt;br /&gt;
&lt;br /&gt;
	This matrix will be very sparse. We want something to aggregate.&lt;br /&gt;
	We need to aggregate process and resources. This is normally not enough.		&lt;br /&gt;
	- Capabilities vs ACL’s (Access Control Lists)&lt;br /&gt;
	&lt;br /&gt;
	Capabilities: Each process has a list of what it can access&lt;br /&gt;
&lt;br /&gt;
        ACL’s: A list associated with each object that contains all the processes that can access that object.&lt;br /&gt;
&lt;br /&gt;
	Unix permissions are very impoverished ACL.&lt;br /&gt;
	&lt;br /&gt;
	* A process should not be able to change its own capabilities&lt;br /&gt;
&lt;br /&gt;
	- But why do this at all?&lt;br /&gt;
		- Rules and restrictions but why?&lt;br /&gt;
		- Done so programs don’t leak info of one user to another.&lt;br /&gt;
		- i.e. Top secret info&lt;br /&gt;
		- How do we make sure no one cheat’s?&lt;br /&gt;
&lt;br /&gt;
	Mandatory Access Control (MAC)&lt;br /&gt;
		- Permissions are set and stone&lt;br /&gt;
		- Cannot be changed at run time&lt;br /&gt;
		- Must boot into special mode with password&lt;br /&gt;
		- Rigid system&lt;br /&gt;
		- SELINUX&lt;br /&gt;
		- Root can’t do everything!&lt;br /&gt;
	&lt;br /&gt;
	Discretionary Access Control (DAC)&lt;br /&gt;
		- Most of us use these systems&lt;br /&gt;
		- Users have the ability to change things&lt;br /&gt;
		- Windows and Linux are discretionary&lt;br /&gt;
&lt;br /&gt;
	* Assignment next week *&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is all from chapter 2 information from the textbook. Assignments will be confirmation of tests.&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
       - Reference Monitor&lt;br /&gt;
	&lt;br /&gt;
		How do we keep programs from breaking these rules?&lt;br /&gt;
                         - Make sure all rule enforcement runs through a small program “The Rule Enforcer”&lt;br /&gt;
                         - You cannot by pass or mess with it&lt;br /&gt;
                         - There must be no bugs therefor elaborate testing must be done.&lt;br /&gt;
                         - Forbid inter communications between processes&lt;br /&gt;
                         - What about covert channels?&lt;br /&gt;
&lt;br /&gt;
	- MULTICS&lt;/div&gt;</summary>
		<author><name>Jakebrown05</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_3&amp;diff=20520</id>
		<title>SystemsSec 2016W Lecture 3</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_3&amp;diff=20520"/>
		<updated>2016-01-15T18:36:09Z</updated>

		<summary type="html">&lt;p&gt;Jakebrown05: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Topics &amp;amp; Readings&lt;br /&gt;
&lt;br /&gt;
	- Notes&lt;br /&gt;
	- Chat&lt;br /&gt;
	- Names&lt;br /&gt;
	- Hacking Journal → Starting next week (Hand in weekly)&lt;br /&gt;
		- Grading&lt;br /&gt;
		- Brainstorming&lt;br /&gt;
&lt;br /&gt;
Class notes&lt;br /&gt;
&lt;br /&gt;
	Hacking Journal:	&lt;br /&gt;
&lt;br /&gt;
2 Note takers per class for participation marks. Make sure to say your name &lt;br /&gt;
before you talk in order to receive participation marks. Check e-mails for DISCORD app, for a chat room that is set up for this course to discuss Hacking topics.&lt;br /&gt;
	&lt;br /&gt;
	Hacking Journal (Record of PAIN)&lt;br /&gt;
		- Weekly hand-ins (3-4 hours a week)&lt;br /&gt;
		- Grades per week as follows:&lt;br /&gt;
                        0 → no Submission, 1 → Handed in, 2 → On the right track&lt;br /&gt;
		- End of semester the grade will be given based on journals as a whole.&lt;br /&gt;
		- Journal outline&lt;br /&gt;
- Date, Time, Durations, Description or explanation of hack or a development of your thinking behind the process chosen. (TXT File)&lt;br /&gt;
&lt;br /&gt;
	Brainstorming:&lt;br /&gt;
&lt;br /&gt;
          You may use the text book, tutorials,  and class exercises to get you started in order to teach how to get familiar the defenses.&lt;br /&gt;
	&lt;br /&gt;
	- Hacking opportunities (Breadth/Depth)&lt;br /&gt;
	- Class exercises/tutorials&lt;br /&gt;
        - Not just breaking into a system but rather how you can mess with a security feature. Playful fun hacks.&lt;br /&gt;
        - Not just tutorials, more so playing&lt;br /&gt;
        - Analysis of how a hack could be done (security analysis) but not only these&lt;br /&gt;
        - Not just one project all semester&lt;br /&gt;
        - You may extend on projects from other classes but not use the same thing.&lt;br /&gt;
        - Setting up of systems to be used for hacking opportunities is highly encouraged. Specifically Linux systems&lt;br /&gt;
        - The set up can be documented in your hacking journal&lt;br /&gt;
        - Making systems do what they are not supposed to do&lt;br /&gt;
        - Repository of exploits for many types of machines (METASPLOIT)&lt;br /&gt;
        - Many system specific exploits&lt;br /&gt;
        - Hackthissite.org is a good place to start for web security&lt;br /&gt;
        - We are aloud to run an old OS and play with its security systems (Old or New)&lt;br /&gt;
        - Weekly submissions will be marked based on progression throughout the course (Moving forward)&lt;br /&gt;
        - ***MONDAY WILL BE FIRST SUBMISSION OF HACKING JOURNAL [MIDNIGHT ON MONDAY]***&lt;br /&gt;
        - Expected to be submitted on time&lt;br /&gt;
        - Don’t be a developer be a hacker (Security Hacking)&lt;br /&gt;
        - Key loggers are boring, don’t make one unless Android version. If you are going to build something, then do it where little already exits.&lt;br /&gt;
        - Bug bounties (You keep the money!)&lt;br /&gt;
        - Do research till you cant find much info on a topic and then work from there.&lt;br /&gt;
        - Do not work on non-authorized systems&lt;br /&gt;
        - Teams are allowed but don’t be a freeloader&lt;br /&gt;
        - Go off the rails and collaborate!&lt;br /&gt;
        - Hoping that some students will find interesting vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Important Concepts&lt;br /&gt;
&lt;br /&gt;
	- Protection domains&lt;br /&gt;
        - separating O/S into boundaries so things don’t mess with other things unless the are supposed to. O/S’s try to separate things into different parts, Processes and resources. We don’t not want either to access everything on the     system.&lt;br /&gt;
&lt;br /&gt;
	- Access matrix&lt;br /&gt;
Processes| Resource&lt;br /&gt;
                    | A|  B   |  C | . | . | . |		&lt;br /&gt;
 1   |             | r | rw | w |&lt;br /&gt;
 2   |             | r | r     | w|&lt;br /&gt;
 3   |             |   | rw | r  |&lt;br /&gt;
&lt;br /&gt;
	This matrix will be very sparse. We want something to aggregate.&lt;br /&gt;
	We need to aggregate process and resources. This is normally not enough.		&lt;br /&gt;
	- Capabilities vs ACL’s (Access Control Lists)&lt;br /&gt;
	&lt;br /&gt;
	Capabilities: Each process has a list of what it can access&lt;br /&gt;
&lt;br /&gt;
        ACL’s: A list associated with each object that contains all the processes that can access that object.&lt;br /&gt;
&lt;br /&gt;
	Unix permissions are very impoverished ACL.&lt;br /&gt;
	&lt;br /&gt;
	* A process should not be able to change its own capabilities&lt;br /&gt;
&lt;br /&gt;
	- But why do this at all?&lt;br /&gt;
		- Rules and restrictions but why?&lt;br /&gt;
		- Done so programs don’t leak info of one user to another.&lt;br /&gt;
		- i.e. Top secret info&lt;br /&gt;
		- How do we make sure no one cheat’s?&lt;br /&gt;
&lt;br /&gt;
	Mandatory Access Control (MAC)&lt;br /&gt;
		- Permissions are set and stone&lt;br /&gt;
		- Cannot be changed at run time&lt;br /&gt;
		- Must boot into special mode with password&lt;br /&gt;
		- Rigid system&lt;br /&gt;
		- SELINUX&lt;br /&gt;
		- Root can’t do everything!&lt;br /&gt;
	&lt;br /&gt;
	Discretionary Access Control (DAC)&lt;br /&gt;
		- Most of us use these systems&lt;br /&gt;
		- Users have the ability to change things&lt;br /&gt;
		- Windows and Linux are discretionary&lt;br /&gt;
&lt;br /&gt;
	* Assignment next week *&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is all from chapter 2 information from the textbook. Assignments will be confirmation of tests.&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
       - Reference Monitor&lt;br /&gt;
	&lt;br /&gt;
		How do we keep programs from breaking these rules?&lt;br /&gt;
                         - Make sure all rule enforcement runs through a small program “The Rule Enforcer”&lt;br /&gt;
                         - You cannot by pass or mess with it&lt;br /&gt;
                         - There must be no bugs therefor elaborate testing must be done.&lt;br /&gt;
                         - Forbid inter communications between processes&lt;br /&gt;
                         - What about covert channels?&lt;br /&gt;
&lt;br /&gt;
	- MULTICS&lt;/div&gt;</summary>
		<author><name>Jakebrown05</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_3&amp;diff=20519</id>
		<title>SystemsSec 2016W Lecture 3</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_3&amp;diff=20519"/>
		<updated>2016-01-15T18:35:54Z</updated>

		<summary type="html">&lt;p&gt;Jakebrown05: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Topics &amp;amp; Readings&lt;br /&gt;
&lt;br /&gt;
	- Notes&lt;br /&gt;
	- Chat&lt;br /&gt;
	- Names&lt;br /&gt;
	- Hacking Journal → Starting next week (Hand in weekly)&lt;br /&gt;
		- Grading&lt;br /&gt;
		- Brainstorming&lt;br /&gt;
&lt;br /&gt;
Class notes&lt;br /&gt;
&lt;br /&gt;
	Hacking Journal:	&lt;br /&gt;
&lt;br /&gt;
2 Note takers per class for participation marks. Make sure to say your name &lt;br /&gt;
before you talk in order to receive participation marks. Check e-mails for DISCORD app, for a chat room that is set up for this course to discuss Hacking topics.&lt;br /&gt;
	&lt;br /&gt;
	Hacking Journal (Record of PAIN)&lt;br /&gt;
		- Weekly hand-ins (3-4 hours a week)&lt;br /&gt;
		- Grades per week as follows:&lt;br /&gt;
                        0 → no Submission, 1 → Handed in, 2 → On the right track&lt;br /&gt;
		- End of semester the grade will be given based on journals as a whole.&lt;br /&gt;
		- Journal outline&lt;br /&gt;
- Date, Time, Durations, Description or explanation of hack or a development of your thinking behind the process chosen. (TXT File)&lt;br /&gt;
&lt;br /&gt;
	Brainstorming:&lt;br /&gt;
&lt;br /&gt;
          You may use the text book, tutorials,  and class exercises to get you started in order to teach how to get familiar the defenses.&lt;br /&gt;
	&lt;br /&gt;
	- Hacking opportunities (Breadth/Depth)&lt;br /&gt;
	- Class exercises/tutorials&lt;br /&gt;
        - Not just breaking into a system but rather how you can mess with a security feature. Playful fun hacks.&lt;br /&gt;
        - Not just tutorials, more so playing&lt;br /&gt;
        - Analysis of how a hack could be done (security analysis) but not only these&lt;br /&gt;
        - Not just one project all semester&lt;br /&gt;
        - You may extend on projects from other classes but not use the same thing.&lt;br /&gt;
        - Setting up of systems to be used for hacking opportunities is highly encouraged. Specifically Linux systems&lt;br /&gt;
        - The set up can be documented in your hacking journal&lt;br /&gt;
        - Making systems do what they are not supposed to do&lt;br /&gt;
        - Repository of exploits for many types of machines (METASPLOIT)&lt;br /&gt;
        - Many system specific exploits&lt;br /&gt;
        - Hackthissite.org is a good place to start for web security&lt;br /&gt;
        - We are aloud to run an old OS and play with its security systems (Old or New)&lt;br /&gt;
        - Weekly submissions will be marked based on progression throughout the course (Moving forward)&lt;br /&gt;
        - ***MONDAY WILL BE FIRST SUBMISSION OF HACKING JOURNAL [MIDNIGHT ON MONDAY]***&lt;br /&gt;
        - Expected to be submitted on time&lt;br /&gt;
        - Don’t be a developer be a hacker (Security Hacking)&lt;br /&gt;
        - Key loggers are boring, don’t make one unless Android version. If you are going to build something, then do it where little already exits.&lt;br /&gt;
        - Bug bounties (You keep the money!)&lt;br /&gt;
        - Do research till you cant find much info on a topic and then work from there.&lt;br /&gt;
        - Do not work on non-authorized systems&lt;br /&gt;
        - Teams are allowed but don’t be a freeloader&lt;br /&gt;
        - Go off the rails and collaborate!&lt;br /&gt;
        - Hoping that some students will find interesting vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Important Concepts&lt;br /&gt;
&lt;br /&gt;
	- Protection domains&lt;br /&gt;
        - separating O/S into boundaries so things don’t mess with other things unless the are supposed to. O/S’s try to separate things into different parts, Processes and resources. We don’t not want either to access everything on the     system.&lt;br /&gt;
&lt;br /&gt;
	- Access matrix&lt;br /&gt;
Processes| Resource&lt;br /&gt;
                    | A|  B   |  C | . | . | . |		&lt;br /&gt;
 1   |             | r | rw | w |&lt;br /&gt;
2   |             | r | r     | w|&lt;br /&gt;
3   |             |   | rw | r  |&lt;br /&gt;
&lt;br /&gt;
	This matrix will be very sparse. We want something to aggregate.&lt;br /&gt;
	We need to aggregate process and resources. This is normally not enough.		&lt;br /&gt;
	- Capabilities vs ACL’s (Access Control Lists)&lt;br /&gt;
	&lt;br /&gt;
	Capabilities: Each process has a list of what it can access&lt;br /&gt;
&lt;br /&gt;
        ACL’s: A list associated with each object that contains all the processes that can access that object.&lt;br /&gt;
&lt;br /&gt;
	Unix permissions are very impoverished ACL.&lt;br /&gt;
	&lt;br /&gt;
	* A process should not be able to change its own capabilities&lt;br /&gt;
&lt;br /&gt;
	- But why do this at all?&lt;br /&gt;
		- Rules and restrictions but why?&lt;br /&gt;
		- Done so programs don’t leak info of one user to another.&lt;br /&gt;
		- i.e. Top secret info&lt;br /&gt;
		- How do we make sure no one cheat’s?&lt;br /&gt;
&lt;br /&gt;
	Mandatory Access Control (MAC)&lt;br /&gt;
		- Permissions are set and stone&lt;br /&gt;
		- Cannot be changed at run time&lt;br /&gt;
		- Must boot into special mode with password&lt;br /&gt;
		- Rigid system&lt;br /&gt;
		- SELINUX&lt;br /&gt;
		- Root can’t do everything!&lt;br /&gt;
	&lt;br /&gt;
	Discretionary Access Control (DAC)&lt;br /&gt;
		- Most of us use these systems&lt;br /&gt;
		- Users have the ability to change things&lt;br /&gt;
		- Windows and Linux are discretionary&lt;br /&gt;
&lt;br /&gt;
	* Assignment next week *&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is all from chapter 2 information from the textbook. Assignments will be confirmation of tests.&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
       - Reference Monitor&lt;br /&gt;
	&lt;br /&gt;
		How do we keep programs from breaking these rules?&lt;br /&gt;
                         - Make sure all rule enforcement runs through a small program “The Rule Enforcer”&lt;br /&gt;
                         - You cannot by pass or mess with it&lt;br /&gt;
                         - There must be no bugs therefor elaborate testing must be done.&lt;br /&gt;
                         - Forbid inter communications between processes&lt;br /&gt;
                         - What about covert channels?&lt;br /&gt;
&lt;br /&gt;
	- MULTICS&lt;/div&gt;</summary>
		<author><name>Jakebrown05</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_3&amp;diff=20518</id>
		<title>SystemsSec 2016W Lecture 3</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_3&amp;diff=20518"/>
		<updated>2016-01-15T18:35:12Z</updated>

		<summary type="html">&lt;p&gt;Jakebrown05: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Topics &amp;amp; Readings&lt;br /&gt;
&lt;br /&gt;
	- Notes&lt;br /&gt;
	- Chat&lt;br /&gt;
	- Names&lt;br /&gt;
	- Hacking Journal → Starting next week (Hand in weekly)&lt;br /&gt;
		- Grading&lt;br /&gt;
		- Brainstorming&lt;br /&gt;
&lt;br /&gt;
Class notes&lt;br /&gt;
&lt;br /&gt;
	Hacking Journal:	&lt;br /&gt;
&lt;br /&gt;
2 Note takers per class for participation marks. Make sure to say your name &lt;br /&gt;
before you talk in order to receive participation marks. Check e-mails for DISCORD app, for a chat room that is set up for this course to discuss Hacking topics.&lt;br /&gt;
	&lt;br /&gt;
	Hacking Journal (Record of PAIN)&lt;br /&gt;
		- Weekly hand-ins (3-4 hours a week)&lt;br /&gt;
		- Grades per week as follows:&lt;br /&gt;
                        0 → no Submission, 1 → Handed in, 2 → On the right track&lt;br /&gt;
		- End of semester the grade will be given based on journals as a whole.&lt;br /&gt;
		- Journal outline&lt;br /&gt;
- Date, Time, Durations, Description or explanation of hack or a development of your thinking behind the process chosen. (TXT File)&lt;br /&gt;
&lt;br /&gt;
	Brainstorming:&lt;br /&gt;
&lt;br /&gt;
          You may use the text book, tutorials,  and class exercises to get you started in order to teach how to get familiar the defenses.&lt;br /&gt;
	&lt;br /&gt;
	- Hacking opportunities (Breadth/Depth)&lt;br /&gt;
	- Class exercises/tutorials&lt;br /&gt;
        - Not just breaking into a system but rather how you can mess with a security feature. Playful fun hacks.&lt;br /&gt;
        - Not just tutorials, more so playing&lt;br /&gt;
        - Analysis of how a hack could be done (security analysis) but not only these&lt;br /&gt;
        - Not just one project all semester&lt;br /&gt;
        - You may extend on projects from other classes but not use the same thing.&lt;br /&gt;
        - Setting up of systems to be used for hacking opportunities is highly encouraged. Specifically Linux systems&lt;br /&gt;
        - The set up can be documented in your hacking journal&lt;br /&gt;
        - Making systems do what they are not supposed to do&lt;br /&gt;
        - Repository of exploits for many types of machines (METASPLOIT)&lt;br /&gt;
        - Many system specific exploits&lt;br /&gt;
        - Hackthissite.org is a good place to start for web security&lt;br /&gt;
        - We are aloud to run an old OS and play with its security systems (Old or New)&lt;br /&gt;
        - Weekly submissions will be marked based on progression throughout the course (Moving forward)&lt;br /&gt;
        - ***MONDAY WILL BE FIRST SUBMISSION OF HACKING JOURNAL [MIDNIGHT ON MONDAY]***&lt;br /&gt;
        - Expected to be submitted on time&lt;br /&gt;
        - Don’t be a developer be a hacker (Security Hacking)&lt;br /&gt;
        - Key loggers are boring, don’t make one unless Android version. If you are going to build something, then do it where little already exits.&lt;br /&gt;
        - Bug bounties (You keep the money!)&lt;br /&gt;
        - Do research till you cant find much info on a topic and then work from there.&lt;br /&gt;
        - Do not work on non-authorized systems&lt;br /&gt;
        - Teams are allowed but don’t be a freeloader&lt;br /&gt;
        - Go off the rails and collaborate!&lt;br /&gt;
        - Hoping that some students will find interesting vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Important Concepts&lt;br /&gt;
&lt;br /&gt;
	- Protection domains&lt;br /&gt;
        - separating O/S into boundaries so things don’t mess with other things unless the are supposed to. O/S’s try to separate things into different parts, Processes and resources. We don’t not want either to access everything on the     system.&lt;br /&gt;
&lt;br /&gt;
	- Access matrix&lt;br /&gt;
&lt;br /&gt;
	Processes| Resource| A|  B   |  C | . | . | . |		&lt;br /&gt;
 			1   |             | r | rw | w |&lt;br /&gt;
			2   |             | r | r     | w|&lt;br /&gt;
			3   |             |    | rw | r  |&lt;br /&gt;
&lt;br /&gt;
	This matrix will be very sparse. We want something to aggregate.&lt;br /&gt;
	We need to aggregate process and resources. This is normally not enough.		&lt;br /&gt;
	- Capabilities vs ACL’s (Access Control Lists)&lt;br /&gt;
	&lt;br /&gt;
	Capabilities: Each process has a list of what it can access&lt;br /&gt;
&lt;br /&gt;
        ACL’s: A list associated with each object that contains all the processes that can access that object.&lt;br /&gt;
&lt;br /&gt;
	Unix permissions are very impoverished ACL.&lt;br /&gt;
	&lt;br /&gt;
	* A process should not be able to change its own capabilities&lt;br /&gt;
&lt;br /&gt;
	- But why do this at all?&lt;br /&gt;
		- Rules and restrictions but why?&lt;br /&gt;
		- Done so programs don’t leak info of one user to another.&lt;br /&gt;
		- i.e. Top secret info&lt;br /&gt;
		- How do we make sure no one cheat’s?&lt;br /&gt;
&lt;br /&gt;
	Mandatory Access Control (MAC)&lt;br /&gt;
		- Permissions are set and stone&lt;br /&gt;
		- Cannot be changed at run time&lt;br /&gt;
		- Must boot into special mode with password&lt;br /&gt;
		- Rigid system&lt;br /&gt;
		- SELINUX&lt;br /&gt;
		- Root can’t do everything!&lt;br /&gt;
	&lt;br /&gt;
	Discretionary Access Control (DAC)&lt;br /&gt;
		- Most of us use these systems&lt;br /&gt;
		- Users have the ability to change things&lt;br /&gt;
		- Windows and Linux are discretionary&lt;br /&gt;
&lt;br /&gt;
	* Assignment next week *&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is all from chapter 2 information from the textbook. Assignments will be confirmation of tests.&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
       - Reference Monitor&lt;br /&gt;
	&lt;br /&gt;
		How do we keep programs from breaking these rules?&lt;br /&gt;
                         - Make sure all rule enforcement runs through a small program “The Rule Enforcer”&lt;br /&gt;
                         - You cannot by pass or mess with it&lt;br /&gt;
                         - There must be no bugs therefor elaborate testing must be done.&lt;br /&gt;
                         - Forbid inter communications between processes&lt;br /&gt;
                         - What about covert channels?&lt;br /&gt;
&lt;br /&gt;
	- MULTICS&lt;/div&gt;</summary>
		<author><name>Jakebrown05</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_3&amp;diff=20517</id>
		<title>SystemsSec 2016W Lecture 3</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_3&amp;diff=20517"/>
		<updated>2016-01-15T18:34:08Z</updated>

		<summary type="html">&lt;p&gt;Jakebrown05: Created page with &amp;quot;Topics &amp;amp; Readings  	- Notes 	- Chat 	- Names 	- Hacking Journal → Starting next week (Hand in weekly) 		- Grading 		- Brainstorming  Class notes  	Hacking Journal:	  2 Note ...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Topics &amp;amp; Readings&lt;br /&gt;
&lt;br /&gt;
	- Notes&lt;br /&gt;
	- Chat&lt;br /&gt;
	- Names&lt;br /&gt;
	- Hacking Journal → Starting next week (Hand in weekly)&lt;br /&gt;
		- Grading&lt;br /&gt;
		- Brainstorming&lt;br /&gt;
&lt;br /&gt;
Class notes&lt;br /&gt;
&lt;br /&gt;
	Hacking Journal:	&lt;br /&gt;
&lt;br /&gt;
2 Note takers per class for participation marks. Make sure to say your name &lt;br /&gt;
before you talk in order to receive participation marks. Check e-mails for DISCORD app, for a chat room that is set up for this course to discuss Hacking topics.&lt;br /&gt;
	&lt;br /&gt;
	Hacking Journal (Record of PAIN)&lt;br /&gt;
		- Weekly hand-ins (3-4 hours a week)&lt;br /&gt;
		- Grades per week as follows:&lt;br /&gt;
                        0 → no Submission, 1 → Handed in, 2 → On the right track&lt;br /&gt;
		- End of semester the grade will be given based on journals as a whole.&lt;br /&gt;
		- Journal outline&lt;br /&gt;
- Date, Time, Durations, Description or explanation of hack or a development of your thinking behind the process chosen. (TXT File)&lt;br /&gt;
&lt;br /&gt;
	Brainstorming:&lt;br /&gt;
&lt;br /&gt;
          You may use the text book, tutorials,  and class exercises to get you started in order to teach how to get familiar the defenses.&lt;br /&gt;
	&lt;br /&gt;
	- Hacking opportunities (Breadth/Depth)&lt;br /&gt;
	- Class exercises/tutorials&lt;br /&gt;
        - Not just breaking into a system but rather how you can mess with a security feature. Playful fun hacks.&lt;br /&gt;
        - Not just tutorials, more so playing&lt;br /&gt;
        - Analysis of how a hack could be done (security analysis) but not only these&lt;br /&gt;
        - Not just one project all semester&lt;br /&gt;
        - You may extend on projects from other classes but not use the same thing.&lt;br /&gt;
        - Setting up of systems to be used for hacking opportunities is highly encouraged. Specifically Linux systems&lt;br /&gt;
        - The set up can be documented in your hacking journal&lt;br /&gt;
        - Making systems do what they are not supposed to do&lt;br /&gt;
        - Repository of exploits for many types of machines (METASPLOIT)&lt;br /&gt;
        - Many system specific exploits&lt;br /&gt;
        - Hackthissite.org is a good place to start for web security&lt;br /&gt;
        - We are aloud to run an old OS and play with its security systems (Old or New)&lt;br /&gt;
        - Weekly submissions will be marked based on progression throughout the course (Moving forward)&lt;br /&gt;
        - ***MONDAY WILL BE FIRST SUBMISSION OF HACKING JOURNAL [MIDNIGHT ON MONDAY]***&lt;br /&gt;
        - Expected to be submitted on time&lt;br /&gt;
        - Don’t be a developer be a hacker (Security Hacking)&lt;br /&gt;
        - Key loggers are boring, don’t make one unless Android version. If you are going to build something, then do it where little already exits.&lt;br /&gt;
        - Bug bounties (You keep the money!)&lt;br /&gt;
        - Do research till you cant find much info on a topic and then work from there.&lt;br /&gt;
        - Do not work on non-authorized systems&lt;br /&gt;
        - Teams are allowed but don’t be a freeloader&lt;br /&gt;
        - Go off the rails and collaborate!&lt;br /&gt;
        - Hoping that some students will find interesting vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Important Concepts&lt;br /&gt;
&lt;br /&gt;
	- Protection domains&lt;br /&gt;
        - separating O/S into boundaries so things don’t mess with other things unless the are supposed to. O/S’s try to separate things into different parts, Processes and resources. We don’t not want either to access everything on the     system.&lt;br /&gt;
&lt;br /&gt;
	- Access matrix&lt;br /&gt;
&lt;br /&gt;
		Processes| Resource	| A|  B   |  C | . | . | . |		&lt;br /&gt;
 			1   |		| r | rw | w |&lt;br /&gt;
			2   |   		| r | r     | w|&lt;br /&gt;
			3   |		|    | rw | r  |&lt;br /&gt;
&lt;br /&gt;
	This matrix will be very sparse. We want something to aggregate.&lt;br /&gt;
	We need to aggregate process and resources. This is normally not enough.		&lt;br /&gt;
	- Capabilities vs ACL’s (Access Control Lists)&lt;br /&gt;
	&lt;br /&gt;
	Capabilities: Each process has a list of what it can access&lt;br /&gt;
&lt;br /&gt;
        ACL’s: A list associated with each object that contains all the processes that can access that object.&lt;br /&gt;
&lt;br /&gt;
	Unix permissions are very impoverished ACL.&lt;br /&gt;
	&lt;br /&gt;
	* A process should not be able to change its own capabilities&lt;br /&gt;
&lt;br /&gt;
	- But why do this at all?&lt;br /&gt;
		- Rules and restrictions but why?&lt;br /&gt;
		- Done so programs don’t leak info of one user to another.&lt;br /&gt;
		- i.e. Top secret info&lt;br /&gt;
		- How do we make sure no one cheat’s?&lt;br /&gt;
&lt;br /&gt;
	Mandatory Access Control (MAC)&lt;br /&gt;
		- Permissions are set and stone&lt;br /&gt;
		- Cannot be changed at run time&lt;br /&gt;
		- Must boot into special mode with password&lt;br /&gt;
		- Rigid system&lt;br /&gt;
		- SELINUX&lt;br /&gt;
		- Root can’t do everything!&lt;br /&gt;
	&lt;br /&gt;
	Discretionary Access Control (DAC)&lt;br /&gt;
		- Most of us use these systems&lt;br /&gt;
		- Users have the ability to change things&lt;br /&gt;
		- Windows and Linux are discretionary&lt;br /&gt;
&lt;br /&gt;
	* Assignment next week *&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is all from chapter 2 information from the textbook. Assignments will be confirmation of tests.&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
       - Reference Monitor&lt;br /&gt;
	&lt;br /&gt;
		How do we keep programs from breaking these rules?&lt;br /&gt;
                         - Make sure all rule enforcement runs through a small program “The Rule Enforcer”&lt;br /&gt;
                         - You cannot by pass or mess with it&lt;br /&gt;
                         - There must be no bugs therefor elaborate testing must be done.&lt;br /&gt;
                         - Forbid inter communications between processes&lt;br /&gt;
                         - What about covert channels?&lt;br /&gt;
&lt;br /&gt;
	- MULTICS&lt;/div&gt;</summary>
		<author><name>Jakebrown05</name></author>
	</entry>
</feed>