# HG changeset patch # User Christian Urban # Date 1444309444 -3600 # Node ID 2d6eb340fd984f5bad8b697f2dd76653c20b4a63 # Parent f05368d007dddbdf0312c397a82d108528512bf4 updated hws diff -r f05368d007dd -r 2d6eb340fd98 hws/hw01.pdf Binary file hws/hw01.pdf has changed diff -r f05368d007dd -r 2d6eb340fd98 hws/hw02.pdf Binary file hws/hw02.pdf has changed diff -r f05368d007dd -r 2d6eb340fd98 hws/hw03.pdf Binary file hws/hw03.pdf has changed diff -r f05368d007dd -r 2d6eb340fd98 hws/hw04.pdf Binary file hws/hw04.pdf has changed diff -r f05368d007dd -r 2d6eb340fd98 hws/hw04.tex --- a/hws/hw04.tex Thu Oct 08 12:08:10 2015 +0100 +++ b/hws/hw04.tex Thu Oct 08 14:04:04 2015 +0100 @@ -5,6 +5,8 @@ \section*{Homework 4} +\HEADER + \begin{enumerate} \item What should the architecture of a network application under Unix be that processes potentially hostile data? diff -r f05368d007dd -r 2d6eb340fd98 style.sty --- a/style.sty Thu Oct 08 12:08:10 2015 +0100 +++ b/style.sty Thu Oct 08 14:04:04 2015 +0100 @@ -32,8 +32,20 @@ \makeatother -\newcommand{\HEADER}{{\bf Please submit your solutions to the email address -7ccsmsen at gmail dot com. Please submit only ASCII text or PDFs. Every solution -should be preceeded by the corresponding question. Solutions will only be accepted until +\newcommand{\HEADER}{{\bf Please submit your solutions to the +email address 7ccsmsen at gmail dot com. Please submit only +ASCII text or PDFs. Every solution should be preceded by the +corresponding question, like: + +\begin{center} +\begin{tabular}{ll} +Q$n$: & \ldots a difficult question from me\ldots\\ +A: & \ldots an answer from you \ldots\\ +Q$n+1$ & \ldots another difficult question\ldots\\ +A: & \ldots another brilliant answer from you\ldots +\end{tabular} +\end{center} + +\noindent Solutions will only be accepted until 30th December!}\bigskip}