--- a/handouts/ho03.tex Mon Oct 06 20:52:53 2014 +0100
+++ b/handouts/ho03.tex Mon Oct 06 21:04:33 2014 +0100
@@ -8,7 +8,7 @@
By far the most popular attack method on computers are buffer
overflow attacks or simple variations thereof. The popularity is
-unfortunate because we now have technology to prevent them
+unfortunate because we nowadays have technology in place to prevent them
effectively. But these kind of attacks are still very relevant
even today since there are many legacy systems out there and
also many modern embedded systems do not take any precautions
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/progs/README Mon Oct 06 21:04:33 2014 +0100
@@ -0,0 +1,10 @@
+
+C0.c
+
+add to string
+
+ " \x15\xcd\x5b\x07"
+
+to get
+
+ foo("my string is too long !!!!! \x15\xcd\x5b\x07");
\ No newline at end of file