--- a/hw04.tex Sun Oct 14 21:44:47 2012 +0100
+++ b/hw04.tex Mon Oct 15 13:11:55 2012 +0100
@@ -7,7 +7,7 @@
\section*{Homework 4}
\begin{enumerate}
-\item What does the principle of least privilege say?
+\item What is bad about security-by-obscurity?
\item In which of the following situations can the access control mechanism of Unix
file permissions be used?
Binary file slides03.pdf has changed
--- a/slides03.tex Sun Oct 14 21:44:47 2012 +0100
+++ b/slides03.tex Mon Oct 15 13:11:55 2012 +0100
@@ -236,8 +236,8 @@
\draw[line width=1mm] (-.3, 0) rectangle (1.5,2);
\draw (4.7,1) node {Internet};
\draw (0.6,1.7) node {\footnotesize Interface};
- \draw (0.6,-0.4) node {\footnotesize \begin{tabular}{c}unpriviledged\\[-1mm] process\end{tabular}};
- \draw (-2.7,-0.4) node {\footnotesize \begin{tabular}{c}priviledged\\[-1mm] process\end{tabular}};
+ \draw (0.6,-0.4) node {\footnotesize \begin{tabular}{c}unprivileged\\[-1mm] process\end{tabular}};
+ \draw (-2.7,-0.4) node {\footnotesize \begin{tabular}{c}privileged\\[-1mm] process\end{tabular}};
\draw[line width=1mm] (-1.8, 0) rectangle (-3.6,2);
@@ -364,8 +364,8 @@
\draw[line width=1mm] (0, 0) rectangle (1.2,0.9);
\draw (0.6,1.7) node {\footnotesize Slave};
\draw (0.6,0.6) node {\footnotesize Slave};
- \draw (0.6,-0.5) node {\footnotesize \begin{tabular}{c}unpriviledged\\[-1mm] processes\end{tabular}};
- \draw (-2.7,-0.4) node {\footnotesize \begin{tabular}{c}priviledged\\[-1mm] process\end{tabular}};
+ \draw (0.6,-0.5) node {\footnotesize \begin{tabular}{c}unprivileged\\[-1mm] processes\end{tabular}};
+ \draw (-2.7,-0.4) node {\footnotesize \begin{tabular}{c}privileged\\[-1mm] process\end{tabular}};
\draw[line width=1mm] (-1.8, 0) rectangle (-3.6,2);
\draw (-2.9,1.7) node {\footnotesize Monitor};