handouts/ho03.tex
changeset 191 f675aa15b6d0
parent 156 3b831b9dc616
child 196 22f027da67ec
--- a/handouts/ho03.tex	Wed Oct 01 16:18:51 2014 +0100
+++ b/handouts/ho03.tex	Fri Oct 03 06:17:25 2014 +0100
@@ -7,11 +7,12 @@
 \section*{Handout 3 (Buffer Overflow Attacks)}
 
 By far the most popular attack method on computers are buffer
-overflow attacks. The popularity is unfortunate since we now
-have technology to prevent them. But these kind of attacks are
-still very relevant even today since there are many legacy
-systems out there and also many modern embedded systems
-do not take any precautions to prevent such attacks.
+overflow attacks or variations thereof. The popularity is
+unfortunate because we now have technology to prevent them
+effectively. But these kind of attacks are still very relevant
+even today since there are many legacy systems out there and
+also many modern embedded systems do not take any precautions
+to prevent such attacks.
 
 To understand how buffer overflow attacks work we have to have
 a look at how computers work ``under the hood'' (on the