Skip to content
Snippets Groups Projects
Commit cdb7aff0 authored by Steve Klabnik's avatar Steve Klabnik
Browse files

typo fix

parent a669d82d
No related branches found
No related tags found
1 merge request!5typo fix
......@@ -11,7 +11,7 @@ Since operating systems are such an integrated part of computing, it is a very s
There have been numerous bugs and vulnerability in Linux, BSD, Glibc, Bash, X, etc. throughout the time, simply due to the lack of memory and type safety. Rust does this right, by enforcing safety statically.
Design do matter, but so does implementation. Avoiding these unexpected memory unsafe conditions (which are, by far, the biggest source of security critical bugs, since they're, by nature, unexpected). Design is a very transparent source of issues. You know what is going on, you know what was intended and what was not.
Design does matter, but so does implementation. Avoiding these unexpected memory unsafe conditions (which are, by far, the biggest source of security critical bugs, since they're, by nature, unexpected). Design is a very transparent source of issues. You know what is going on, you know what was intended and what was not.
The basic design of the kernel/userspace separation is fairly similar to genuine \*nix systems, at this point. The idea is roughly the same: you seperate kernel and userspace, through strict enforcement by the kernel, which is managing memory and other critical resources.
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment