handouts/ho01.tex
changeset 168 793ae8926a97
parent 167 d8657ff8cca1
child 169 2866fae8c1cf
--- a/handouts/ho01.tex	Tue Sep 23 10:24:38 2014 +0100
+++ b/handouts/ho01.tex	Tue Sep 23 10:31:03 2014 +0100
@@ -35,18 +35,17 @@
 \end{quote}
 
 \noindent In this module I like to teach you this security
-mindset. This might be a mindset that you think is very
-foreign to you (after all we are all good citizens). I beg to
-differ: You have this mindset already when in school you were
-thinking, at least hypothetically, in which ways you can cheat
-in an exam (whether it is about hiding notes or looking over
-the shoulders of your fellow pupils). Right? To defend a
-system, you need to have this kind mindset and be able to
-think like an attacker. This will include understanding
-techniques that can be used to compromise security and privacy
-in systems. This will many times result in insights where
-well-intended security mechanism made a system actually less
-secure.\smallskip 
+mindset. This might be a mindset that you think is very foreign to you
+(after all we are all good citizens and not ahck into things). I beg
+to differ: You have this mindset already when in school you were
+thinking, at least hypothetically, in which ways you can cheat in an
+exam (whether it is about hiding notes or looking over the shoulders
+of your fellow pupils). Right? To defend a system, you need to have
+this kind mindset and be able to think like an attacker. This will
+include understanding techniques that can be used to compromise
+security and privacy in systems. This will many times result in
+insights where well-intended security mechanism made a system actually
+less secure.\smallskip
 
 {\Large\bf Warning!} However, don’t be evil! Using those
 techniques in the real world may violate the law or King’s