hws/hw07.tex
changeset 137 6fc7de0f23ba
parent 97 efcac3016613
child 139 059527f0615a
--- a/hws/hw07.tex	Tue Nov 19 20:19:19 2013 +0000
+++ b/hws/hw07.tex	Mon Nov 25 20:31:01 2013 +0000
@@ -22,14 +22,14 @@
 
 for constructing a proof of the judgement. What do the premises look like? 
 
-\item The informal meaning of the formula \mbox{$P\;\mapsto\;Q$} is `$P$ speaks for
-$Q$'. Give a definition for this formula in terms of $\textit{says}$.
+%\item The informal meaning of the formula \mbox{$P\;\mapsto\;Q$} is `$P$ speaks for
+%$Q$'. Give a definition for this formula in terms of $\textit{says}$.
 
-\item In Unix, what should be the general architecture of a network application that 
-processes potentially hostile data from the Internet? (Hint: Focus on the fact that in Unix
-you can give different privileges to processes.)
+%\item In Unix, what should be the general architecture of a network application that 
+%processes potentially hostile data from the Internet? (Hint: Focus on the fact that in Unix
+%you can give different privileges to processes.)
 
-\item Explain what are the differences between dictionary and brute forcing attacks  against  passwords.
+%\item Explain what are the differences between dictionary and brute forcing attacks  against  passwords.
 
 \end{enumerate}
 \end{document}