# HG changeset patch # User Christian Urban # Date 1498751290 -3600 # Node ID 0fbfb0a86fa8e5289fee9935fe26aaa8d42e3f6a # Parent 41d3aea3113db50588f53b0550e3ea458f54b667 updated diff -r 41d3aea3113d -r 0fbfb0a86fa8 LINKS --- a/LINKS Sat Jun 03 23:57:07 2017 +0100 +++ b/LINKS Thu Jun 29 16:48:10 2017 +0100 @@ -30,4 +30,5 @@ blockchain -https://medium.com/@lhartikk/a-blockchain-in-200-lines-of-code-963cc1cc0e54 \ No newline at end of file +https://medium.com/@lhartikk/a-blockchain-in-200-lines-of-code-963cc1cc0e54 +http://www.samlewis.me/2017/06/a-peek-under-bitcoins-hood/ \ No newline at end of file diff -r 41d3aea3113d -r 0fbfb0a86fa8 handouts/ho03.pdf Binary file handouts/ho03.pdf has changed diff -r 41d3aea3113d -r 0fbfb0a86fa8 handouts/ho03.tex --- a/handouts/ho03.tex Sat Jun 03 23:57:07 2017 +0100 +++ b/handouts/ho03.tex Thu Jun 29 16:48:10 2017 +0100 @@ -18,10 +18,19 @@ % gdb frontend \begin{document} -\fnote{\copyright{} Christian Urban, King's College London, 2014, 2015, 2016} +\fnote{\copyright{} Christian Urban, King's College London, 2014, 2015, 2016, 2017} \section*{Handout 3 (Buffer Overflow Attacks)} +\begin{flushright} +\begin{minipage}{9cm} +\it ``We took a network that was designed to be resilient to nuclear war and +we made it vulnerable to toasters.''\\\mbox{}\hfill\small --- Eben Upton, 2017, RPi co-founder +\end{minipage} +\end{flushright}\bigskip + + +\noindent By far the most popular attack method on computers are buffer overflow attacks or variations thereof. The first Internet worm (Morris) exploited exactly such an attack. The popularity diff -r 41d3aea3113d -r 0fbfb0a86fa8 handouts/ho08.tex --- a/handouts/ho08.tex Sat Jun 03 23:57:07 2017 +0100 +++ b/handouts/ho08.tex Thu Jun 29 16:48:10 2017 +0100 @@ -38,6 +38,10 @@ % contradictions and misunderstandings. Most of its problems are very % fixable, if you want to fix them + +% history of bitcoins +% https://futurism.com/images/this-week-in-tech-jan-15-22-2016/ + \begin{document} \fnote{\copyright{} Christian Urban, 2014, 2015}