updated
authorChristian Urban <christian dot urban at kcl dot ac dot uk>
Sat, 17 Oct 2015 11:31:12 +0100
changeset 413 0f824ca252e4
parent 412 c30668124312
child 414 9a3aa8c39951
updated
hws/hw01.pdf
hws/hw01.tex
hws/hw04.pdf
hws/hw04.tex
Binary file hws/hw01.pdf has changed
--- a/hws/hw01.tex	Thu Oct 15 14:06:47 2015 +0100
+++ b/hws/hw01.tex	Sat Oct 17 11:31:12 2015 +0100
@@ -109,13 +109,13 @@
 \item What is the difference between a brute force attack and a 
   dictionary attack on passwords? 
   
-\item Even good passwords consisting of 8 characters, can be 
-  broken in around 50 days (obviously this time varies a lot and
-  also gets shorter and shorter). Do you think it is good 
-  policy to require users to change their password every 3 
-  months (as King's did until recently)? Under which 
-  circumstance should users be required to change their 
-  password?
+\item Even good passwords consisting of 8 characters, can be
+      broken in around 50 days (obviously this time varies a
+      lot and also gets shorter and shorter over time). Do you
+      think it is good policy to require users to change their
+      password every 3 months (as King's did until recently)?
+      Under which circumstance should users be required to
+      change their password?
 
 \item What are good uses of cookies (that is browser cookies)?
 
Binary file hws/hw04.pdf has changed
--- a/hws/hw04.tex	Thu Oct 15 14:06:47 2015 +0100
+++ b/hws/hw04.tex	Sat Oct 17 11:31:12 2015 +0100
@@ -8,22 +8,23 @@
 \HEADER
 
 \begin{enumerate}
-\item What should the architecture of a network application under Unix
-  be that processes potentially hostile data?
+\item What should the architecture of a network application
+      under Unix be that processes potentially hostile data?
 
 \item What is a unikernel system and why is a unikernel
-preferable on a web server system (in contrast to a traditional
-general purpose operating system like Linux). Hint: What is
-the idea of a unikernel.
+      preferable on a web server system (in contrast to a
+      traditional general purpose operating system like
+      Linux). Hint: What is the idea of a unikernel?
 
 \item What does the principle of least privilege say?
 
-\item How can you exploit the fact that every night root has a cron
-  job that deletes the files in \texttt{/tmp}? (Hint: cron-attack)
+\item How can you exploit the fact that every night root has a
+      cron job that deletes the files in \texttt{/tmp}? (Hint:
+      cron-attack)
 
 
-\item In which of the following situations can the access control mechanism of Unix
-file permissions be used?
+\item In which of the following situations can the access
+      control mechanism of Unix file permissions be used?
 
 \begin{itemize}
 \item[(a)] Alice wants to have her files readable, except for her office mates.