equal
deleted
inserted
replaced
3 \usepackage{../langs} |
3 \usepackage{../langs} |
4 \usepackage{../graphics} |
4 \usepackage{../graphics} |
5 \usepackage{../data} |
5 \usepackage{../data} |
6 |
6 |
7 \begin{document} |
7 \begin{document} |
|
8 \fnote{\copyright{} Christian Urban, 2014} |
8 |
9 |
9 \section*{Handout 3 (Buffer Overflow Attacks)} |
10 \section*{Handout 3 (Buffer Overflow Attacks)} |
10 |
11 |
11 By far the most popular attack method on computers are buffer |
12 By far the most popular attack method on computers are buffer |
12 overflow attacks or variations thereof. The first Internet |
13 overflow attacks or variations thereof. The first Internet |