# HG changeset patch # User Christian Urban # Date 1445077872 -3600 # Node ID 0f824ca252e45534043c78f8d8c645f7140b7ca7 # Parent c30668124312ac40fc5c9784f5b7979f62ad2e43 updated diff -r c30668124312 -r 0f824ca252e4 hws/hw01.pdf Binary file hws/hw01.pdf has changed diff -r c30668124312 -r 0f824ca252e4 hws/hw01.tex --- a/hws/hw01.tex Thu Oct 15 14:06:47 2015 +0100 +++ b/hws/hw01.tex Sat Oct 17 11:31:12 2015 +0100 @@ -109,13 +109,13 @@ \item What is the difference between a brute force attack and a dictionary attack on passwords? -\item Even good passwords consisting of 8 characters, can be - broken in around 50 days (obviously this time varies a lot and - also gets shorter and shorter). Do you think it is good - policy to require users to change their password every 3 - months (as King's did until recently)? Under which - circumstance should users be required to change their - password? +\item Even good passwords consisting of 8 characters, can be + broken in around 50 days (obviously this time varies a + lot and also gets shorter and shorter over time). Do you + think it is good policy to require users to change their + password every 3 months (as King's did until recently)? + Under which circumstance should users be required to + change their password? \item What are good uses of cookies (that is browser cookies)? diff -r c30668124312 -r 0f824ca252e4 hws/hw04.pdf Binary file hws/hw04.pdf has changed diff -r c30668124312 -r 0f824ca252e4 hws/hw04.tex --- a/hws/hw04.tex Thu Oct 15 14:06:47 2015 +0100 +++ b/hws/hw04.tex Sat Oct 17 11:31:12 2015 +0100 @@ -8,22 +8,23 @@ \HEADER \begin{enumerate} -\item What should the architecture of a network application under Unix - be that processes potentially hostile data? +\item What should the architecture of a network application + under Unix be that processes potentially hostile data? \item What is a unikernel system and why is a unikernel -preferable on a web server system (in contrast to a traditional -general purpose operating system like Linux). Hint: What is -the idea of a unikernel. + preferable on a web server system (in contrast to a + traditional general purpose operating system like + Linux). Hint: What is the idea of a unikernel? \item What does the principle of least privilege say? -\item How can you exploit the fact that every night root has a cron - job that deletes the files in \texttt{/tmp}? (Hint: cron-attack) +\item How can you exploit the fact that every night root has a + cron job that deletes the files in \texttt{/tmp}? (Hint: + cron-attack) -\item In which of the following situations can the access control mechanism of Unix -file permissions be used? +\item In which of the following situations can the access + control mechanism of Unix file permissions be used? \begin{itemize} \item[(a)] Alice wants to have her files readable, except for her office mates.