diff -r 2f2693a22626 -r 09130eb5a9b6 hw04.tex --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/hw04.tex Sun Oct 14 21:44:47 2012 +0100 @@ -0,0 +1,38 @@ +\documentclass{article} +\usepackage{charter} +\usepackage{hyperref} + +\begin{document} + +\section*{Homework 4} + +\begin{enumerate} +\item What does the principle of least privilege say? + +\item In which of the following situations can the access control mechanism of Unix +file permissions be used? + +\begin{itemize} +\item[(a)] Alice wants to have her files readable, except for her office mates. +\item[(b)] Bob and Sam want to share some secret files. +\item[(c)] Root wants some of her files to be public. +\end{itemize} + +\item What should the architecture of a network application under Unix +be that processes potentially hostile data? + +\item How can you exploit the fact that every night root has a cron +job that deletes the files in \texttt{/tmp}? + +\item What does it mean that the program \texttt{passwd} has the \texttt{setuid} +bit set? Why is this necessary? + +\item (Optional) Imagine you want to atack a +\end{enumerate} + +\end{document} + +%%% Local Variables: +%%% mode: latex +%%% TeX-master: t +%%% End: