Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You’re complaining that DOS lacked features and protections. But zero cost abstractions like DOS can still be robust (in the sense of being reliable and solid.) yes it requires more trust, But there is no guarantee modern OSes can run arbitrary zero-trust binaries.



If you run a buggy program on a modern OS, it won't crash the system or impact other processes. If you run a buggy program on DOS, it will write to random physical addresses, probably clobbering the state of other processes and of DOS.

Modern OSes can run arbitrary binaries, but they can pretty much run arbitrary non-adversarial binaries - problematic binaries have to be intentionally written to exploit the system (as opposed to DOS, where non-problematic binaries had to be intentionally written to not break the system).

It's a dramatic improvement.


It doesn't matter what OS I run. My "modern", and apparently buggy, CPU runs arbitrary systems that I know very little about, and I have little to no control over.

Since 2008, it's been a dramatic departure.


> Modern OSes can run arbitrary binaries, but they can pretty much run arbitrary non-adversarial binaries

Mostly. Modern OSes strive to run abdersarial binaries, but where they can do it safely or not is still in question, IMO.


DOS did nothing and so people extended it with TSR's: "terminate and stay resident" programs. These were a nightmare. They had "conflicts": users had to experiment with the order in which they were loaded to make them like each other. Some of them were interrupt-driven and yet needed to call into DOS, which would be bad if the interrupt had gone of in the middle of DOS. So they tried to guess whether that was the case.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: