equal
deleted
inserted
replaced
5 \begin{document} |
5 \begin{document} |
6 |
6 |
7 \section*{Homework 1} |
7 \section*{Homework 1} |
8 |
8 |
9 \begin{enumerate} |
9 \begin{enumerate} |
10 \item {\bf (Optional)} If you want to look at code presented in the lectures, install Scala available from |
10 \item {\bf (Optional)} If you want to have a look at the code presented in the lectures, install Scala available (for free) from |
11 \begin{center} |
11 \begin{center} |
12 \url{http://www.scala-lang.org} |
12 \url{http://www.scala-lang.org} |
13 \end{center} |
13 \end{center} |
14 |
14 |
15 \noindent |
15 \noindent |
16 The web-applications were written in Scala using the Play Framework available from |
16 The web-applications from the first lecture are written in Scala using the Play Framework available (also for free) from |
17 \begin{center} |
17 \begin{center} |
18 \url{http://www.playframework.org} |
18 \url{http://www.playframework.org} |
19 \end{center} |
19 \end{center} |
20 |
20 |
21 \item Practice thinking like an attacker. Assume the following situation: |
21 \item Practice thinking like an attacker. Assume the following situation: |
33 Think of ways how you can cheat in this exam? |
33 Think of ways how you can cheat in this exam? |
34 |
34 |
35 \item Explain what hashes and salts are. Describe how they can be used for ensuring data integrity and |
35 \item Explain what hashes and salts are. Describe how they can be used for ensuring data integrity and |
36 storing password information. |
36 storing password information. |
37 |
37 |
38 \item What are good uses of cookies (browser cookies)? |
38 \item What are good uses of cookies (that is browser cookies)? |
39 |
39 |
40 \end{enumerate} |
40 \end{enumerate} |
41 |
41 |
42 \end{document} |
42 \end{document} |
43 |
43 |