--- a/hw03.tex Mon Sep 23 17:02:24 2013 +0100
+++ /dev/null Thu Jan 01 00:00:00 1970 +0000
@@ -1,38 +0,0 @@
-\documentclass{article}
-\usepackage{charter}
-\usepackage{hyperref}
-
-\begin{document}
-
-\section*{Homework 3}
-
-\begin{enumerate}
-\item What does the principle of least privilege say?
-
-\item In which of the following situations can the access control mechanism of Unix
-file permissions be used?
-
-\begin{itemize}
-\item[(a)] Alice wants to have her files readable, except for her office mates.
-\item[(b)] Bob and Sam want to share some secret files.
-\item[(c)] Root wants some of her files to be public.
-\end{itemize}
-
-\item What should the architecture of a network application under Unix
-be that processes potentially hostile data?
-
-\item How can you exploit the fact that every night root has a cron
-job that deletes the files in \texttt{/tmp}?
-
-\item What does it mean that the program \texttt{passwd} has the \texttt{setuid}
-bit set? Why is this necessary?
-
-\item What does the Bell --- La Padula model ensure? Similarly, what does the Biba model ensure?
-\end{enumerate}
-
-\end{document}
-
-%%% Local Variables:
-%%% mode: latex
-%%% TeX-master: t
-%%% End: