diff -r 4ee6812ab436 -r f675aa15b6d0 handouts/ho03.tex --- a/handouts/ho03.tex Wed Oct 01 16:18:51 2014 +0100 +++ b/handouts/ho03.tex Fri Oct 03 06:17:25 2014 +0100 @@ -7,11 +7,12 @@ \section*{Handout 3 (Buffer Overflow Attacks)} By far the most popular attack method on computers are buffer -overflow attacks. The popularity is unfortunate since we now -have technology to prevent them. But these kind of attacks are -still very relevant even today since there are many legacy -systems out there and also many modern embedded systems -do not take any precautions to prevent such attacks. +overflow attacks or variations thereof. The popularity is +unfortunate because we now have technology to prevent them +effectively. But these kind of attacks are still very relevant +even today since there are many legacy systems out there and +also many modern embedded systems do not take any precautions +to prevent such attacks. To understand how buffer overflow attacks work we have to have a look at how computers work ``under the hood'' (on the