1. How did the "Blaster Worm" attack Windows-32 operating systems using Shellcode? Explain its mechanism.
2. How do discretionary access control systems (DACs) differ from Mandatory Access Control (MAC)?
Please answer each question using at least 60words (each).