diff -r 058504a45c34 -r 6fc7de0f23ba hws/hw07.tex --- a/hws/hw07.tex Tue Nov 19 20:19:19 2013 +0000 +++ b/hws/hw07.tex Mon Nov 25 20:31:01 2013 +0000 @@ -22,14 +22,14 @@ for constructing a proof of the judgement. What do the premises look like? -\item The informal meaning of the formula \mbox{$P\;\mapsto\;Q$} is `$P$ speaks for -$Q$'. Give a definition for this formula in terms of $\textit{says}$. +%\item The informal meaning of the formula \mbox{$P\;\mapsto\;Q$} is `$P$ speaks for +%$Q$'. Give a definition for this formula in terms of $\textit{says}$. -\item In Unix, what should be the general architecture of a network application that -processes potentially hostile data from the Internet? (Hint: Focus on the fact that in Unix -you can give different privileges to processes.) +%\item In Unix, what should be the general architecture of a network application that +%processes potentially hostile data from the Internet? (Hint: Focus on the fact that in Unix +%you can give different privileges to processes.) -\item Explain what are the differences between dictionary and brute forcing attacks against passwords. +%\item Explain what are the differences between dictionary and brute forcing attacks against passwords. \end{enumerate} \end{document}