# HG changeset patch # User Christian Urban # Date 1385411461 0 # Node ID 6fc7de0f23baf5417e44a3a86d56bf529ac15d39 # Parent 058504a45c34fc4d94db1398399157d575aa1319 added HW 07 diff -r 058504a45c34 -r 6fc7de0f23ba hws/hw07.pdf Binary file hws/hw07.pdf has changed diff -r 058504a45c34 -r 6fc7de0f23ba hws/hw07.tex --- a/hws/hw07.tex Tue Nov 19 20:19:19 2013 +0000 +++ b/hws/hw07.tex Mon Nov 25 20:31:01 2013 +0000 @@ -22,14 +22,14 @@ for constructing a proof of the judgement. What do the premises look like? -\item The informal meaning of the formula \mbox{$P\;\mapsto\;Q$} is `$P$ speaks for -$Q$'. Give a definition for this formula in terms of $\textit{says}$. +%\item The informal meaning of the formula \mbox{$P\;\mapsto\;Q$} is `$P$ speaks for +%$Q$'. Give a definition for this formula in terms of $\textit{says}$. -\item In Unix, what should be the general architecture of a network application that -processes potentially hostile data from the Internet? (Hint: Focus on the fact that in Unix -you can give different privileges to processes.) +%\item In Unix, what should be the general architecture of a network application that +%processes potentially hostile data from the Internet? (Hint: Focus on the fact that in Unix +%you can give different privileges to processes.) -\item Explain what are the differences between dictionary and brute forcing attacks against passwords. +%\item Explain what are the differences between dictionary and brute forcing attacks against passwords. \end{enumerate} \end{document}