--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/handouts/ho03.tex Wed Sep 03 11:01:14 2014 +0100
@@ -0,0 +1,30 @@
+\documentclass{article}
+\usepackage{../style}
+
+
+\begin{document}
+
+\section*{Handout 3 (Buffer Overflow Attacks)}
+
+By far the most popular attack method on computers are buffer
+overflow attacks. The popularity is unfortunate since we now
+have technology to prevent them. But these kind of attacks are
+still very relevant even today since there are many legacy
+systems out there and also many modern embedded systems
+do not take any precautions to prevent such attacks.
+
+To understand how buffer overflow attacks work we have to have
+a look at how computers work ``under the hood'' (on the
+machine level) and also understand some aspects of the C/C++
+programming language. This might not be everyday fare for
+computer science students, but who said that criminal hackers
+restrict themselves to everyday fare? Not to mention the
+free-riding script-kiddies who use this technology without
+knowing what are the underlying ideas.
+
+\end{document}
+
+%%% Local Variables:
+%%% mode: latex
+%%% TeX-master: t
+%%% End: