Binary file hws/hw01.pdf has changed
--- a/hws/hw01.tex Thu Oct 15 14:06:47 2015 +0100
+++ b/hws/hw01.tex Sat Oct 17 11:31:12 2015 +0100
@@ -109,13 +109,13 @@
\item What is the difference between a brute force attack and a
dictionary attack on passwords?
-\item Even good passwords consisting of 8 characters, can be
- broken in around 50 days (obviously this time varies a lot and
- also gets shorter and shorter). Do you think it is good
- policy to require users to change their password every 3
- months (as King's did until recently)? Under which
- circumstance should users be required to change their
- password?
+\item Even good passwords consisting of 8 characters, can be
+ broken in around 50 days (obviously this time varies a
+ lot and also gets shorter and shorter over time). Do you
+ think it is good policy to require users to change their
+ password every 3 months (as King's did until recently)?
+ Under which circumstance should users be required to
+ change their password?
\item What are good uses of cookies (that is browser cookies)?
Binary file hws/hw04.pdf has changed
--- a/hws/hw04.tex Thu Oct 15 14:06:47 2015 +0100
+++ b/hws/hw04.tex Sat Oct 17 11:31:12 2015 +0100
@@ -8,22 +8,23 @@
\HEADER
\begin{enumerate}
-\item What should the architecture of a network application under Unix
- be that processes potentially hostile data?
+\item What should the architecture of a network application
+ under Unix be that processes potentially hostile data?
\item What is a unikernel system and why is a unikernel
-preferable on a web server system (in contrast to a traditional
-general purpose operating system like Linux). Hint: What is
-the idea of a unikernel.
+ preferable on a web server system (in contrast to a
+ traditional general purpose operating system like
+ Linux). Hint: What is the idea of a unikernel?
\item What does the principle of least privilege say?
-\item How can you exploit the fact that every night root has a cron
- job that deletes the files in \texttt{/tmp}? (Hint: cron-attack)
+\item How can you exploit the fact that every night root has a
+ cron job that deletes the files in \texttt{/tmp}? (Hint:
+ cron-attack)
-\item In which of the following situations can the access control mechanism of Unix
-file permissions be used?
+\item In which of the following situations can the access
+ control mechanism of Unix file permissions be used?
\begin{itemize}
\item[(a)] Alice wants to have her files readable, except for her office mates.