--- a/hw04.tex	Sun Oct 14 21:44:47 2012 +0100
+++ b/hw04.tex	Mon Oct 15 13:11:55 2012 +0100
@@ -7,7 +7,7 @@
 \section*{Homework 4}
 
 \begin{enumerate}
-\item What does the principle of least privilege say?
+\item What is bad about security-by-obscurity?
 
 \item In which of the following situations can the access control mechanism of Unix
 file permissions be used?
Binary file slides03.pdf has changed
--- a/slides03.tex	Sun Oct 14 21:44:47 2012 +0100
+++ b/slides03.tex	Mon Oct 15 13:11:55 2012 +0100
@@ -236,8 +236,8 @@
   \draw[line width=1mm] (-.3, 0) rectangle (1.5,2);
   \draw (4.7,1) node {Internet};
   \draw (0.6,1.7) node {\footnotesize Interface};
-  \draw (0.6,-0.4) node {\footnotesize \begin{tabular}{c}unpriviledged\\[-1mm] process\end{tabular}};
-  \draw (-2.7,-0.4) node {\footnotesize \begin{tabular}{c}priviledged\\[-1mm] process\end{tabular}};
+  \draw (0.6,-0.4) node {\footnotesize \begin{tabular}{c}unprivileged\\[-1mm] process\end{tabular}};
+  \draw (-2.7,-0.4) node {\footnotesize \begin{tabular}{c}privileged\\[-1mm] process\end{tabular}};
   
   \draw[line width=1mm] (-1.8, 0) rectangle (-3.6,2);
 
@@ -364,8 +364,8 @@
   \draw[line width=1mm] (0, 0) rectangle (1.2,0.9);
   \draw (0.6,1.7) node {\footnotesize Slave};
   \draw (0.6,0.6) node {\footnotesize Slave};
-  \draw (0.6,-0.5) node {\footnotesize \begin{tabular}{c}unpriviledged\\[-1mm] processes\end{tabular}};
-  \draw (-2.7,-0.4) node {\footnotesize \begin{tabular}{c}priviledged\\[-1mm] process\end{tabular}};
+  \draw (0.6,-0.5) node {\footnotesize \begin{tabular}{c}unprivileged\\[-1mm] processes\end{tabular}};
+  \draw (-2.7,-0.4) node {\footnotesize \begin{tabular}{c}privileged\\[-1mm] process\end{tabular}};
   
   \draw[line width=1mm] (-1.8, 0) rectangle (-3.6,2);
   \draw (-2.9,1.7) node {\footnotesize Monitor};