16
|
1 |
\documentclass{article}
|
|
2 |
\usepackage{charter}
|
|
3 |
\usepackage{hyperref}
|
|
4 |
|
|
5 |
\begin{document}
|
|
6 |
|
|
7 |
\section*{Homework 1}
|
|
8 |
|
|
9 |
\begin{enumerate}
|
|
10 |
\item {\bf (Optional)} If you want to have a look at the code presented in the lectures, install Scala available (for free) from
|
|
11 |
\begin{center}
|
|
12 |
\url{http://www.scala-lang.org}
|
|
13 |
\end{center}
|
|
14 |
|
|
15 |
\noindent
|
|
16 |
The web-applications from the first lecture are written in Scala using the Play Framework available (also for free) from
|
|
17 |
\begin{center}
|
|
18 |
\url{http://www.playframework.org}
|
|
19 |
\end{center}
|
|
20 |
|
|
21 |
\item Practice thinking like an attacker. Assume the following situation:
|
|
22 |
\begin{quote}\it
|
|
23 |
Prof.~V.~Nasty gives the following final exam question (closed books, closed notes):\bigskip
|
|
24 |
|
|
25 |
\noindent
|
|
26 |
\begin{tabular}{@ {}l}
|
|
27 |
Write the first 100 digits of pi:\\
|
|
28 |
3.\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_
|
|
29 |
\end{tabular}
|
|
30 |
\end{quote}
|
|
31 |
|
|
32 |
\noindent
|
|
33 |
Think of ways how you can cheat in this exam?
|
|
34 |
|
|
35 |
\item Explain what hashes and salts are. Describe how they can be used for ensuring data integrity and
|
|
36 |
storing password information.
|
|
37 |
|
|
38 |
\item What are good uses of cookies (that is browser cookies)?
|
|
39 |
|
|
40 |
\end{enumerate}
|
|
41 |
|
|
42 |
\end{document}
|
|
43 |
|
|
44 |
%%% Local Variables:
|
|
45 |
%%% mode: latex
|
|
46 |
%%% TeX-master: t
|
|
47 |
%%% End:
|