diff -r f05368d007dd -r 2d6eb340fd98 hws/hw04.tex --- a/hws/hw04.tex Thu Oct 08 12:08:10 2015 +0100 +++ b/hws/hw04.tex Thu Oct 08 14:04:04 2015 +0100 @@ -5,6 +5,8 @@ \section*{Homework 4} +\HEADER + \begin{enumerate} \item What should the architecture of a network application under Unix be that processes potentially hostile data?