diff -r 9b45079eacea -r 3391a4fc3533 hws/hw04.tex --- a/hws/hw04.tex Tue Jan 16 10:23:43 2018 +0000 +++ b/hws/hw04.tex Fri Jun 01 15:46:34 2018 +0100 @@ -8,6 +8,7 @@ \HEADER \begin{enumerate} +\item nosuid question \url{https://rcoh.me/posts/sudo-science/} \item What should the architecture of a network application under Unix be that processes potentially hostile data?