bsc-projects-13.html
changeset 243 d24749d0282d
parent 242 ea17aab7cea6
child 244 ead1dd6818f3
--- a/bsc-projects-13.html	Mon Oct 07 15:44:32 2013 +0100
+++ b/bsc-projects-13.html	Mon Oct 07 15:45:22 2013 +0100
@@ -69,7 +69,7 @@
   <code>aaaaaaaaaaaaaaaaaaaaaaaaaaaa</code> (that is 28 <code>a</code>s), you will soon notice that your CPU usage goes to 100%. In fact,
   Python and Ruby need approximately 30 seconds of hard work for matching this string. You can try it for yourself:
   <A HREF="http://www.dcs.kcl.ac.uk/staff/urbanc/cgi-bin/repos.cgi/afl-material/raw-file/tip/progs/re.py">re.py</A> (Python version) and 
-  <A HREF="http://www.dcs.kcl.ac.uk/staff/urbanc/cgi-bin/repos.cgi/afl-material/raw-file/tip/progs/re-internal.rb">re.rb</A> 
+  <A HREF="http://www.dcs.kcl.ac.uk/staff/urbanc/cgi-bin/repos.cgi/afl-material/raw-file/tip/progs/re.rb">re.rb</A> 
   (Ruby version). You can imagine an attacker
   mounting a nice <A HREF="http://en.wikipedia.org/wiki/Denial-of-service_attack">DoS attack</A> against 
   your program if it contains such an &ldquo;evil&rdquo; regular expression. Actually 
@@ -553,7 +553,7 @@
 </TABLE>
 
 <P>
-<!-- hhmts start --> Last modified: Mon Oct  7 15:44:19 BST 2013 <!-- hhmts end -->
+<!-- hhmts start --> Last modified: Mon Oct  7 15:45:18 BST 2013 <!-- hhmts end -->
 <a href="http://validator.w3.org/check/referer">[Validate this page.]</a>
 </BODY>
 </HTML>