Binary file hw03.pdf has changed
--- a/hw03.tex Fri Oct 12 05:44:55 2012 +0100
+++ b/hw03.tex Sun Oct 14 21:44:47 2012 +0100
@@ -4,7 +4,7 @@
\begin{document}
-\section*{Homework 2}
+\section*{Homework 3}
\begin{enumerate}
\item What does the principle of least privilege say?
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/hw04.tex Sun Oct 14 21:44:47 2012 +0100
@@ -0,0 +1,38 @@
+\documentclass{article}
+\usepackage{charter}
+\usepackage{hyperref}
+
+\begin{document}
+
+\section*{Homework 4}
+
+\begin{enumerate}
+\item What does the principle of least privilege say?
+
+\item In which of the following situations can the access control mechanism of Unix
+file permissions be used?
+
+\begin{itemize}
+\item[(a)] Alice wants to have her files readable, except for her office mates.
+\item[(b)] Bob and Sam want to share some secret files.
+\item[(c)] Root wants some of her files to be public.
+\end{itemize}
+
+\item What should the architecture of a network application under Unix
+be that processes potentially hostile data?
+
+\item How can you exploit the fact that every night root has a cron
+job that deletes the files in \texttt{/tmp}?
+
+\item What does it mean that the program \texttt{passwd} has the \texttt{setuid}
+bit set? Why is this necessary?
+
+\item (Optional) Imagine you want to atack a
+\end{enumerate}
+
+\end{document}
+
+%%% Local Variables:
+%%% mode: latex
+%%% TeX-master: t
+%%% End:
--- a/slides03.tex Fri Oct 12 05:44:55 2012 +0100
+++ b/slides03.tex Sun Oct 14 21:44:47 2012 +0100
@@ -71,7 +71,7 @@
showstringspaces=false}
% beamer stuff
-\renewcommand{\slidecaption}{APP 02, King's College London, 9 October 2012}
+\renewcommand{\slidecaption}{APP 03, King's College London, 9 October 2012}
\begin{document}