diff -r c30668124312 -r 0f824ca252e4 hws/hw04.tex --- a/hws/hw04.tex Thu Oct 15 14:06:47 2015 +0100 +++ b/hws/hw04.tex Sat Oct 17 11:31:12 2015 +0100 @@ -8,22 +8,23 @@ \HEADER \begin{enumerate} -\item What should the architecture of a network application under Unix - be that processes potentially hostile data? +\item What should the architecture of a network application + under Unix be that processes potentially hostile data? \item What is a unikernel system and why is a unikernel -preferable on a web server system (in contrast to a traditional -general purpose operating system like Linux). Hint: What is -the idea of a unikernel. + preferable on a web server system (in contrast to a + traditional general purpose operating system like + Linux). Hint: What is the idea of a unikernel? \item What does the principle of least privilege say? -\item How can you exploit the fact that every night root has a cron - job that deletes the files in \texttt{/tmp}? (Hint: cron-attack) +\item How can you exploit the fact that every night root has a + cron job that deletes the files in \texttt{/tmp}? (Hint: + cron-attack) -\item In which of the following situations can the access control mechanism of Unix -file permissions be used? +\item In which of the following situations can the access + control mechanism of Unix file permissions be used? \begin{itemize} \item[(a)] Alice wants to have her files readable, except for her office mates.