handouts/ho03.tex
changeset 452 3447cc029e2f
parent 451 b6eb8142dec1
child 455 2d9e005100f4
equal deleted inserted replaced
451:b6eb8142dec1 452:3447cc029e2f
     3 \usepackage{../langs}
     3 \usepackage{../langs}
     4 \usepackage{../graphics}
     4 \usepackage{../graphics}
     5 \usepackage{../data}
     5 \usepackage{../data}
     6 
     6 
     7 \begin{document}
     7 \begin{document}
     8 \fnote{\copyright{} Christian Urban, 2014, 2015}
     8 \fnote{\copyright{} Christian Urban, King's College London, 2014, 2015, 2016}
     9 
     9 
    10 \section*{Handout 3 (Buffer Overflow Attacks)}
    10 \section*{Handout 3 (Buffer Overflow Attacks)}
    11 
    11 
    12 By far the most popular attack method on computers are buffer
    12 By far the most popular attack method on computers are buffer
    13 overflow attacks or variations thereof. The first Internet
    13 overflow attacks or variations thereof. The first Internet