# HG changeset patch # User Christian Urban # Date 1436362572 -3600 # Node ID 7d8ad963ad24f8aff0a52274bee655c757019763 # Parent bc612039d1746e9ae30ebfc64fcf4567560f1ffc updated diff -r bc612039d174 -r 7d8ad963ad24 handouts/ho03.pdf Binary file handouts/ho03.pdf has changed diff -r bc612039d174 -r 7d8ad963ad24 handouts/ho03.tex --- a/handouts/ho03.tex Thu Jun 25 00:04:46 2015 +0100 +++ b/handouts/ho03.tex Wed Jul 08 14:36:12 2015 +0100 @@ -59,11 +59,11 @@ machine level) and also understand some aspects of the C/C++ programming language. This might not be everyday fare for computer science students, but who said that criminal hackers -restrict themselves to everyday fare? Not to mention the +restrict themselves to everyday fare? ...not to mention the free-riding script-kiddies who use this technology without even knowing what the underlying ideas are. If you want to be -a good security engineer who needs to defend such attacks, -then better you get to know the details. +a good security engineer who needs to defend against such attacks, +then better you get to know the details too. For buffer overflow attacks to work, a number of innocent design decisions, which are really benign on their own, need