fishfry, may I ask for your opinion? — Shawn
utilizing the ECC-RAM utilized nowadays in servers to be able to predetermine the state of a computer through directly interacting with the system OS itself. — Shawn
ECC Ram is just error-correcting memory. It wouldn't offer any functional difference from any other kind of RAM. So I didn't understand that part. — fishfry
How would it be able to "predetermine the state of a computer?" Are you talking about branch prediction? This is a 20 or 30 year old idea as far as I know. — fishfry
What does it mean to directly interact with the OS? Of course the software directly interacts with the hardware. So I'm afraid I couldn't make sense of this line and kind of got stuck here. — fishfry
The CPU would simple directly input integer values into the OS by having mounted on the RAM and bypassing slow hard drives through an application like TimeShift. — Shawn
I've had this idea of making computing faster — Shawn
For example, when a hacker tries to alter the system — Shawn
But, the thing I'm trying to do is have this being a real time process by mounting the OS onto RAM and directly monitoring it (in Linux) by a program called TimeShift.
For example, when a hacker tries to alter the system, he would be able to do so because the OS is predefined to always be restored to default settings when a change is detected by System Restore in Windows or TimeShift in Linux. — Shawn
So are you proposing to speed up computers, or detect unauthorized intrusions? — fishfry
I'm confused, the kernel is already "mounted" in RAM if you mean that it already has its code in some location in RAM. The kernel (and OS in general) needs to be in RAM so context switching to kernel space and subsequent kernel operations is as fast as possible. After all, the OS is just another process which happens to have been given special privileges by the CPU during the boot sequence. — darthbarracuda
Are you proposing that the operating system monitors itself? — darthbarracuda
Well, as a direct outcome of having TimeShift running on the go, it would be a safer system by default. The root folder would restore itself once any alteration would be attempted on it by monitoring any attempted change to values on the kernel. — Shawn
The kernel is a computer program at the core of a computer's operating system and has complete control over everything in the system.[1] It is the "portion of the operating system code that is always resident in memory",[2] and facilitates interactions between hardware and software components. A full kernel controls all hardware resources (e.g. I/O, memory, Cryptography) via device drivers, arbitrates conflicts between processes concerning such resources, and optimizes the utilization of common resources e.g. CPU & cache usage, file systems, and network sockets. On most systems, the kernel is one of the first programs loaded on startup (after the bootloader). It handles the rest of startup as well as memory, peripherals, and input/output (I/O) requests from software, translating them into data-processing instructions for the central processing unit.
What if a friendly actor needs to make a change to this root folder for legitimate reasons? — darthbarracuda
What if a friendly actor needs to make a change to this root folder for legitimate reasons? — darthbarracuda
What if this TimeShift program gets hacked in some way? It seems like a major security vulnerability for a program other than the kernel to have access to this sort of thing. — darthbarracuda
Couldn't you get a crypto hash of whatever files you're worried about and then set up a cronjob to periodically calculate the hash and compare it to the stored one? If the hashes don't match, time to restore a backup. That's an oversimplified idea that is already in use. — darthbarracuda
So the point is, how would the computer function if every time the OS needed to modify the kernel's data structures, you backed those changes out?
That could be an issue; but, the kernel would simply revert itself back to a default state after an intrusion attempt. — Shawn
Could you point out where this is in use? — Shawn
How? — darthbarracuda
If this TimeShift program gets hacked, it could have its revert abilities removed. — darthbarracuda
I don't think the way the OS for Debian would allow elevated privilege before the OS would restore default vales and the administrator informed of a hacking attempt on root. — Shawn
You could have the kernel monitor whenever write operations are attempted on root, and report them then. — darthbarracuda
Processes can't open files without going through the kernel, which checks the permissions of the user against the permissions of the file. — darthbarracuda
Well if you want a perfectly unhackable root, this idea might suffice. — Shawn
’Normal processes' with the appropriate privilege level must and do have constant read/write access to root. — emancipate
If some processes need to have access to root, then I don't see the issue with making exemptions for TimeShift not to alter the directory or file class they would need to operate in — Shawn
There is no such thing as a steady state system in computing. What exactly are you talking about? Non-volatile memory? Give an example of a 'steady state system'. — emancipate
Alternatively, simply use a dedicated IDS rather than software designed for a completely different purpose (rollback functionality). — emancipate
Get involved in philosophical discussions about knowledge, truth, language, consciousness, science, politics, religion, logic and mathematics, art, history, and lots more. No ads, no clutter, and very little agreement — just fascinating conversations.