handouts/ho03.tex
changeset 366 34a8f73b2c94
parent 326 6e4e9bdedf7b
child 374 7d8ad963ad24
equal deleted inserted replaced
365:942205605c30 366:34a8f73b2c94
     3 \usepackage{../langs}
     3 \usepackage{../langs}
     4 \usepackage{../graphics}
     4 \usepackage{../graphics}
     5 \usepackage{../data}
     5 \usepackage{../data}
     6 
     6 
     7 \begin{document}
     7 \begin{document}
       
     8 \fnote{\copyright{} Christian Urban, 2014}
     8 
     9 
     9 \section*{Handout 3 (Buffer Overflow Attacks)}
    10 \section*{Handout 3 (Buffer Overflow Attacks)}
    10 
    11 
    11 By far the most popular attack method on computers are buffer
    12 By far the most popular attack method on computers are buffer
    12 overflow attacks or variations thereof. The first Internet
    13 overflow attacks or variations thereof. The first Internet