hws/hw04.tex
changeset 413 0f824ca252e4
parent 404 4e3bc09748f7
child 425 4a0bff167159
--- a/hws/hw04.tex	Thu Oct 15 14:06:47 2015 +0100
+++ b/hws/hw04.tex	Sat Oct 17 11:31:12 2015 +0100
@@ -8,22 +8,23 @@
 \HEADER
 
 \begin{enumerate}
-\item What should the architecture of a network application under Unix
-  be that processes potentially hostile data?
+\item What should the architecture of a network application
+      under Unix be that processes potentially hostile data?
 
 \item What is a unikernel system and why is a unikernel
-preferable on a web server system (in contrast to a traditional
-general purpose operating system like Linux). Hint: What is
-the idea of a unikernel.
+      preferable on a web server system (in contrast to a
+      traditional general purpose operating system like
+      Linux). Hint: What is the idea of a unikernel?
 
 \item What does the principle of least privilege say?
 
-\item How can you exploit the fact that every night root has a cron
-  job that deletes the files in \texttt{/tmp}? (Hint: cron-attack)
+\item How can you exploit the fact that every night root has a
+      cron job that deletes the files in \texttt{/tmp}? (Hint:
+      cron-attack)
 
 
-\item In which of the following situations can the access control mechanism of Unix
-file permissions be used?
+\item In which of the following situations can the access
+      control mechanism of Unix file permissions be used?
 
 \begin{itemize}
 \item[(a)] Alice wants to have her files readable, except for her office mates.