equal
deleted
inserted
replaced
|
1 \documentclass{article} |
|
2 \usepackage{charter} |
|
3 \usepackage{hyperref} |
|
4 |
|
5 \begin{document} |
|
6 |
|
7 \section*{Homework 1} |
|
8 |
|
9 \begin{enumerate} |
|
10 \item {\bf (Optional)} If you want to look at code presented in the lectures, install Scala available from |
|
11 \begin{center} |
|
12 \url{http://www.scala-lang.org} |
|
13 \end{center} |
|
14 |
|
15 \noindent |
|
16 The web-applications were written in Scala using the Play Framework available from |
|
17 \begin{center} |
|
18 \url{http://www.playframework.org} |
|
19 \end{center} |
|
20 |
|
21 \item Practice thinking like an attacker. Assume the following situation: |
|
22 \begin{quote}\it |
|
23 Prof.~V.~Nasty gives the following final exam question (closed books, closed notes):\bigskip |
|
24 |
|
25 \noindent |
|
26 \begin{tabular}{@ {}l} |
|
27 Write the first 100 digits of pi:\\ |
|
28 3.\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ |
|
29 \end{tabular} |
|
30 \end{quote} |
|
31 |
|
32 \noindent |
|
33 Think of ways how you can cheat in this exam? |
|
34 |
|
35 \item Explain what hashes and salts are. Describe how they can be used for ensuring data integrity and |
|
36 storing password information. |
|
37 |
|
38 \item What are good uses of cookies (browser cookies)? |
|
39 |
|
40 \end{enumerate} |
|
41 |
|
42 \end{document} |
|
43 |
|
44 %%% Local Variables: |
|
45 %%% mode: latex |
|
46 %%% TeX-master: t |
|
47 %%% End: |