equal
deleted
inserted
replaced
|
1 \documentclass{article} |
|
2 \usepackage{charter} |
|
3 \usepackage{hyperref} |
|
4 |
|
5 \begin{document} |
|
6 |
|
7 \section*{Homework 4} |
|
8 |
|
9 \begin{enumerate} |
|
10 \item What does the principle of least privilege say? |
|
11 |
|
12 \item In which of the following situations can the access control mechanism of Unix |
|
13 file permissions be used? |
|
14 |
|
15 \begin{itemize} |
|
16 \item[(a)] Alice wants to have her files readable, except for her office mates. |
|
17 \item[(b)] Bob and Sam want to share some secret files. |
|
18 \item[(c)] Root wants some of her files to be public. |
|
19 \end{itemize} |
|
20 |
|
21 \item What should the architecture of a network application under Unix |
|
22 be that processes potentially hostile data? |
|
23 |
|
24 \item How can you exploit the fact that every night root has a cron |
|
25 job that deletes the files in \texttt{/tmp}? |
|
26 |
|
27 \item What does it mean that the program \texttt{passwd} has the \texttt{setuid} |
|
28 bit set? Why is this necessary? |
|
29 |
|
30 \item (Optional) Imagine you want to atack a |
|
31 \end{enumerate} |
|
32 |
|
33 \end{document} |
|
34 |
|
35 %%% Local Variables: |
|
36 %%% mode: latex |
|
37 %%% TeX-master: t |
|
38 %%% End: |