--- a/hws/hw04.tex Thu Oct 08 12:08:10 2015 +0100
+++ b/hws/hw04.tex Thu Oct 08 14:04:04 2015 +0100
@@ -5,6 +5,8 @@
\section*{Homework 4}
+\HEADER
+
\begin{enumerate}
\item What should the architecture of a network application under Unix
be that processes potentially hostile data?