hws/hw07.tex
changeset 137 6fc7de0f23ba
parent 97 efcac3016613
child 139 059527f0615a
equal deleted inserted replaced
136:058504a45c34 137:6fc7de0f23ba
    20 \mbox{\infer{\Gamma \vdash F_1 \wedge F_2}{\Gamma \vdash F_1 & \Gamma \vdash F_2}}
    20 \mbox{\infer{\Gamma \vdash F_1 \wedge F_2}{\Gamma \vdash F_1 & \Gamma \vdash F_2}}
    21 \end{center}
    21 \end{center}
    22 
    22 
    23 for constructing a proof of the judgement. What do the premises look like? 
    23 for constructing a proof of the judgement. What do the premises look like? 
    24 
    24 
    25 \item The informal meaning of the formula \mbox{$P\;\mapsto\;Q$} is `$P$ speaks for
    25 %\item The informal meaning of the formula \mbox{$P\;\mapsto\;Q$} is `$P$ speaks for
    26 $Q$'. Give a definition for this formula in terms of $\textit{says}$.
    26 %$Q$'. Give a definition for this formula in terms of $\textit{says}$.
    27 
    27 
    28 \item In Unix, what should be the general architecture of a network application that 
    28 %\item In Unix, what should be the general architecture of a network application that 
    29 processes potentially hostile data from the Internet? (Hint: Focus on the fact that in Unix
    29 %processes potentially hostile data from the Internet? (Hint: Focus on the fact that in Unix
    30 you can give different privileges to processes.)
    30 %you can give different privileges to processes.)
    31 
    31 
    32 \item Explain what are the differences between dictionary and brute forcing attacks  against  passwords.
    32 %\item Explain what are the differences between dictionary and brute forcing attacks  against  passwords.
    33 
    33 
    34 \end{enumerate}
    34 \end{enumerate}
    35 \end{document}
    35 \end{document}
    36 
    36 
    37 %%% Local Variables: 
    37 %%% Local Variables: