6 Quotes from The Tipping Point That Helped Me Rethink How To Evoke Change Successfully

Gladwell has long been a writer that I’ve been following, from his podcasts to other books like The Bomber Mafia. The Tipping Point was a book that was gifted to me a few years ago after a friend had…

Smartphone

独家优惠奖金 100% 高达 1 BTC + 180 免费旋转




Kernel space and User space

In UNIX-like operating systems, there are two spaces in virtual memory. Kernel space in which the kernel is located and executed and user space.

This separation provides protection on processes over memory.

Typically, in the x86 architecture, there are 4 rings of protection. Ring 0 (kernel mode), ring 1 (may be used by virtual machine hypervisors or drivers), ring 2 (may be used by drivers), ring 3 (where user applications run).

The programs running outside of kernel is executed in user space. They are located at the outermost ring, therefore, have no access to the inner rings, and privileged instructions.

This way, if I write a very bad code, and try to access to some places in memory that I shouldn’t by mistake, I get a segmentation fault for example. Why? Because it is not permitted. I cannot access other programs’ data, I cannot access some stuff related to operating a computer.

This prevents both bad programmers and hackers to do some bad stuff.

Add a comment

Related posts:

I Got A Chase Sapphire Preferred Card

Chase Sapphire Preserved is one of the best credit cards for traveling based on the reviews I’ve read so far. I’m always buying gas and food plus I wanted to travel so it seemed like a good match for…

The Top Three Most Lucrative Countries For Bitcoin Miners

This year has been topsy-turvy for Bitcoin — but which one isn’t? Since December its value has dropped from $13,860 to $9,244, leading many part-time investors to pull funds from Coinbase and other…