tuned
authorChristian Urban <urbanc@in.tum.de>
Sun, 14 Oct 2012 21:44:47 +0100
changeset 39 09130eb5a9b6
parent 38 2f2693a22626
child 40 11681bbf0e01
tuned
hw03.pdf
hw03.tex
hw04.tex
slides03.tex
Binary file hw03.pdf has changed
--- a/hw03.tex	Fri Oct 12 05:44:55 2012 +0100
+++ b/hw03.tex	Sun Oct 14 21:44:47 2012 +0100
@@ -4,7 +4,7 @@
 
 \begin{document}
 
-\section*{Homework 2}
+\section*{Homework 3}
 
 \begin{enumerate}
 \item What does the principle of least privilege say?
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/hw04.tex	Sun Oct 14 21:44:47 2012 +0100
@@ -0,0 +1,38 @@
+\documentclass{article}
+\usepackage{charter}
+\usepackage{hyperref}
+
+\begin{document}
+
+\section*{Homework 4}
+
+\begin{enumerate}
+\item What does the principle of least privilege say?
+
+\item In which of the following situations can the access control mechanism of Unix
+file permissions be used?
+
+\begin{itemize}
+\item[(a)] Alice wants to have her files readable, except for her office mates.
+\item[(b)] Bob and Sam want to share some secret files.
+\item[(c)] Root wants some of her files to be public.
+\end{itemize}
+
+\item What should the architecture of a network application under Unix 
+be that processes potentially hostile data?
+
+\item How can you exploit the fact that every night root has a cron
+job that deletes the files in \texttt{/tmp}?
+
+\item What does it mean that the program \texttt{passwd} has the \texttt{setuid}
+bit set? Why is this necessary?
+
+\item (Optional) Imagine you want to atack a 
+\end{enumerate}
+
+\end{document}
+
+%%% Local Variables: 
+%%% mode: latex
+%%% TeX-master: t
+%%% End: 
--- a/slides03.tex	Fri Oct 12 05:44:55 2012 +0100
+++ b/slides03.tex	Sun Oct 14 21:44:47 2012 +0100
@@ -71,7 +71,7 @@
 	showstringspaces=false}
 
 % beamer stuff 
-\renewcommand{\slidecaption}{APP 02, King's College London, 9 October 2012}
+\renewcommand{\slidecaption}{APP 03, King's College London, 9 October 2012}
 
 
 \begin{document}