equal
deleted
inserted
replaced
11 \item What should the architecture of a network application under Unix |
11 \item What should the architecture of a network application under Unix |
12 be that processes potentially hostile data? |
12 be that processes potentially hostile data? |
13 |
13 |
14 \item What is a unikernel system and why is a unikernel |
14 \item What is a unikernel system and why is a unikernel |
15 preferable on a web server system (in contrast to a traditional |
15 preferable on a web server system (in contrast to a traditional |
16 general purpose operating system like Linux). |
16 general purpose operating system like Linux). Hint: What is |
|
17 the idea of a unikernel. |
17 |
18 |
18 \item What does the principle of least privilege say? |
19 \item What does the principle of least privilege say? |
19 |
20 |
20 \item How can you exploit the fact that every night root has a cron |
21 \item How can you exploit the fact that every night root has a cron |
21 job that deletes the files in \texttt{/tmp}? (Hint: cron-attack) |
22 job that deletes the files in \texttt{/tmp}? (Hint: cron-attack) |