links
authorChristian Urban <christian dot urban at kcl dot ac dot uk>
Thu, 26 Sep 2013 10:32:28 +0100
changeset 232 9d8d6d900660
parent 231 d5fdb5c6248b
child 233 a62a47b84053
links
bsc-projects-13.html
--- a/bsc-projects-13.html	Tue Sep 24 18:27:41 2013 +0100
+++ b/bsc-projects-13.html	Thu Sep 26 10:32:28 2013 +0100
@@ -68,8 +68,8 @@
   innocently looking regular expression <code>a?{28}a{28}</code> and match it, say, against the string 
   <code>aaaaaaaaaaaaaaaaaaaaaaaaaaaa</code> (that is 28 <code>a</code>s), you will soon notice that your CPU usage goes to 100%. In fact,
   Python and Ruby need approximately 30 seconds of hard work for matching this string. You can try it for yourself:
-  <A HREF="http://www.dcs.kcl.ac.uk/staff/urbanc/cgi-bin/repos.cgi/afl-material/raw-file/tip/re.py">re.py</A> (Python version) and 
-  <A HREF="http://www.dcs.kcl.ac.uk/staff/urbanc/cgi-bin/repos.cgi/afl-material/raw-file/tip/re-internal.rb">re.rb</A> 
+  <A HREF="http://www.dcs.kcl.ac.uk/staff/urbanc/cgi-bin/repos.cgi/afl-material/raw-file/tip/progs/re.py">re.py</A> (Python version) and 
+  <A HREF="http://www.dcs.kcl.ac.uk/staff/urbanc/cgi-bin/repos.cgi/afl-material/raw-file/tip/progs/re-internal.rb">re.rb</A> 
   (Ruby version). You can imagine an attacker
   mounting a nice <A HREF="http://en.wikipedia.org/wiki/Denial-of-service_attack">DoS attack</A> against 
   your program if it contains such an &ldquo;evil&rdquo; regular expression. Actually