# HG changeset patch # User Christian Urban # Date 1350017095 -3600 # Node ID 2f2693a22626dd62dc13ec89a26c8ca0536de003 # Parent 31e879c6cbc199a5a3ea713ba2dfada7ee1edf77 typo diff -r 31e879c6cbc1 -r 2f2693a22626 hw03.pdf Binary file hw03.pdf has changed diff -r 31e879c6cbc1 -r 2f2693a22626 hw03.tex --- a/hw03.tex Tue Oct 09 20:37:45 2012 +0100 +++ b/hw03.tex Fri Oct 12 05:44:55 2012 +0100 @@ -18,14 +18,14 @@ \item[(c)] Root wants some of her files to be public. \end{itemize} -\item What should be the architecture of a network application under Unix +\item What should the architecture of a network application under Unix be that processes potentially hostile data? \item How can you exploit the fact that every night root has a cron -job that delete the files in \texttt{/tmp}? +job that deletes the files in \texttt{/tmp}? \item What does it mean that the program \texttt{passwd} has the \texttt{setuid} -bit be set? Why is this necessary? +bit set? Why is this necessary? \item What does the Bell --- La Padula model ensure? Similarly, what does the Biba model ensure? \end{enumerate}