equal
deleted
inserted
replaced
32 \item Assume you can crash a program remotely. Why is this a problem? |
32 \item Assume you can crash a program remotely. Why is this a problem? |
33 |
33 |
34 \item How can the choice of a programming language help with buffer overflow attacks? |
34 \item How can the choice of a programming language help with buffer overflow attacks? |
35 (Hint: Why are C-programs prone to such attacks, but not Java programs.) |
35 (Hint: Why are C-programs prone to such attacks, but not Java programs.) |
36 |
36 |
37 \item How can a system that separates between \emph{users} and \emph{root} |
37 %\item How can a system that separates between \emph{users} and \emph{root} |
38 be of any help with buffer overflow attacks? |
38 %be of any help with buffer overflow attacks? |
39 \end{enumerate} |
39 \end{enumerate} |
40 |
40 |
41 \end{document} |
41 \end{document} |
42 |
42 |
43 %%% Local Variables: |
43 %%% Local Variables: |