Is Southwest still flying Boeing 737s? If so, enough said...
Pretty much every airline is, only a few exceptions. They've been making the things since 1969 with iterations, engine upgrades, etc.
Is Southwest still flying Boeing 737s? If so, enough said...
eBPF uses a custom intermediate representation, which avoids some of the ambiguity of a language like C. If the verifier can't conclude that the program is safe, it's not allowed to run. Unlike normal programmer static analysis tools, it's not a "best-effort" sort of affair and no ambiguity is tolerated.I don't think eBPF is such a panacea as you describe it.
From your wiki link I see that it's static code analysis and it only checks whether pointers are checked before dererferencing and whether loops are guaranteed to have an exit condition -- if it passes then executable doesn't have any further restrictions and can still cause havoc because static code analysis most certainly is bound to have some unhandled corner case hiding somewhere.
It started out as a glorified solution for writing firewall rules and then got generalized from there. A lot of the earlier stuff written about it might mention limitations which no longer exist or fail to list capabilities that have been added more recently.Also, it doesn't seem to be of much use for stuff not related to networking and EDR solution also needs access to pipes, IOCTLs of other drivers, and file handles.
The question is whether Windows executes it in kernel, which I doubt. I think the kernel would have to natively support it, in order to attain the performance benefits that native execution can provide.There's even a version for Windows if you are interested on GitHub.
I think the mention of no updates was in reference to fixing the security flaws that are surely rife, in such old versions of Windows. Therefore, not immaterial.Of course, this article is completely wrong in its entire premise.
Yes, these ancient versions of Windows aren't getting updates, but since it wasn't a Windows Update that caused the problem, that's immaterial.
I have checked the official docs and enums for hooks and didn't see anything but packet stuff. Source for additional functionality please.It started out as a glorified solution for writing firewall rules and then got generalized from there. A lot of the earlier stuff written about it might mention limitations which no longer exist or fail to list capabilities that have been added more recently.
Well it says you have to install a driver. I don't see how it could work otherwise.The question is whether Windows executes it in kernel, which I doubt.
Here are a few developments that might be of interest.I have checked the official docs and enums for hooks and didn't see anything but packet stuff. Source for additional functionality please.
... I am not at all convinced it is useful except for firewalls.