Completed
What Accesses Are Unwanted?
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Smack Reference Policy: Creating a Rule Set for Linux Distributions
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Simplified Mandatory Access Control Kernel
- 3 Compared To SELinux
- 4 Compared To AppArmor
- 5 Smack is not a privilege system
- 6 Built In Smack Access Rules
- 7 Specified Smack Access Rules
- 8 Access Modes
- 9 Access Quirks
- 10 The Reference Threat
- 11 Complications
- 12 Choosing A Use Case
- 13 Tooling Considerations
- 14 Choosing A Distribution
- 15 The Three Domain Model
- 16 Toolbox
- 17 What Accesses Are Unwanted?
- 18 Simple Configuration
- 19 Transmuting Directories
- 20 var/lib/apt
- 21 Graphically
- 22 With Implicit Access
- 23 With Privileged Access
- 24 And Shared Data
- 25 To Consider
- 26 Work To Be Done For The Distribution