Binary file hw03.pdf has changed
--- a/hw03.tex Tue Oct 09 20:26:54 2012 +0100
+++ b/hw03.tex Tue Oct 09 20:30:06 2012 +0100
@@ -9,7 +9,7 @@
\begin{enumerate}
\item What does the principle of least privilege say?
-\item In which situations can the access control mechanism of Unix
+\item In which of the following situations can the access control mechanism of Unix
file permissions be used?
\begin{itemize}
@@ -21,6 +21,12 @@
\item What should be the architecture of a network application under Unix
be that processes potentially hostile data?
+\item How can you exploit the fact that every night root has a cron
+job that delete the files in \texttt{/tmp}?
+
+\item What does it mean that the program \texttt{passwd} has the \texttt{setuid}
+bit be set? Why is this necessary?
+
\item What does the Bell --- La Pudela model ensure? Similarly, what does the Biba model ensure?
\end{enumerate}