updated
authorChristian Urban <urbanc@in.tum.de>
Thu, 29 Jun 2017 16:48:10 +0100
changeset 516 0fbfb0a86fa8
parent 515 41d3aea3113d
child 517 9a6480cb6e37
updated
LINKS
handouts/ho03.pdf
handouts/ho03.tex
handouts/ho08.tex
--- a/LINKS	Sat Jun 03 23:57:07 2017 +0100
+++ b/LINKS	Thu Jun 29 16:48:10 2017 +0100
@@ -30,4 +30,5 @@
 
 
 blockchain
-https://medium.com/@lhartikk/a-blockchain-in-200-lines-of-code-963cc1cc0e54
\ No newline at end of file
+https://medium.com/@lhartikk/a-blockchain-in-200-lines-of-code-963cc1cc0e54
+http://www.samlewis.me/2017/06/a-peek-under-bitcoins-hood/
\ No newline at end of file
Binary file handouts/ho03.pdf has changed
--- a/handouts/ho03.tex	Sat Jun 03 23:57:07 2017 +0100
+++ b/handouts/ho03.tex	Thu Jun 29 16:48:10 2017 +0100
@@ -18,10 +18,19 @@
 % gdb frontend
 
 \begin{document}
-\fnote{\copyright{} Christian Urban, King's College London, 2014, 2015, 2016}
+\fnote{\copyright{} Christian Urban, King's College London, 2014, 2015, 2016, 2017}
 
 \section*{Handout 3 (Buffer Overflow Attacks)}
 
+\begin{flushright}
+\begin{minipage}{9cm}
+\it ``We took a network that was designed to be resilient to nuclear war and
+we made it vulnerable to toasters.''\\\mbox{}\hfill\small --- Eben Upton, 2017, RPi co-founder
+\end{minipage}
+\end{flushright}\bigskip
+
+
+\noindent
 By far the most popular attack method on computers are buffer
 overflow attacks or variations thereof. The first Internet
 worm (Morris) exploited exactly such an attack. The popularity
--- a/handouts/ho08.tex	Sat Jun 03 23:57:07 2017 +0100
+++ b/handouts/ho08.tex	Thu Jun 29 16:48:10 2017 +0100
@@ -38,6 +38,10 @@
 % contradictions and misunderstandings. Most of its problems are very
 % fixable, if you want to fix them
 
+
+% history of bitcoins
+% https://futurism.com/images/this-week-in-tech-jan-15-22-2016/
+
 \begin{document}
 \fnote{\copyright{} Christian Urban, 2014, 2015}