tuned
authorChristian Urban <urbanc@in.tum.de>
Tue, 09 Oct 2012 20:30:06 +0100
changeset 34 24116ce8c294
parent 33 e9288308dbcf
child 35 7dd341037669
tuned
hw03.pdf
hw03.tex
Binary file hw03.pdf has changed
--- a/hw03.tex	Tue Oct 09 20:26:54 2012 +0100
+++ b/hw03.tex	Tue Oct 09 20:30:06 2012 +0100
@@ -9,7 +9,7 @@
 \begin{enumerate}
 \item What does the principle of least privilege say?
 
-\item In which situations can the access control mechanism of Unix
+\item In which of the following situations can the access control mechanism of Unix
 file permissions be used?
 
 \begin{itemize}
@@ -21,6 +21,12 @@
 \item What should be the architecture of a network application under Unix 
 be that processes potentially hostile data?
 
+\item How can you exploit the fact that every night root has a cron
+job that delete the files in \texttt{/tmp}?
+
+\item What does it mean that the program \texttt{passwd} has the \texttt{setuid}
+bit be set? Why is this necessary?
+
 \item What does the Bell --- La Pudela model ensure? Similarly, what does the Biba model ensure?
 \end{enumerate}