typo
authorChristian Urban <urbanc@in.tum.de>
Fri, 12 Oct 2012 05:44:55 +0100
changeset 38 2f2693a22626
parent 37 31e879c6cbc1
child 39 09130eb5a9b6
typo
hw03.pdf
hw03.tex
Binary file hw03.pdf has changed
--- a/hw03.tex	Tue Oct 09 20:37:45 2012 +0100
+++ b/hw03.tex	Fri Oct 12 05:44:55 2012 +0100
@@ -18,14 +18,14 @@
 \item[(c)] Root wants some of her files to be public.
 \end{itemize}
 
-\item What should be the architecture of a network application under Unix 
+\item What should the architecture of a network application under Unix 
 be that processes potentially hostile data?
 
 \item How can you exploit the fact that every night root has a cron
-job that delete the files in \texttt{/tmp}?
+job that deletes the files in \texttt{/tmp}?
 
 \item What does it mean that the program \texttt{passwd} has the \texttt{setuid}
-bit be set? Why is this necessary?
+bit set? Why is this necessary?
 
 \item What does the Bell --- La Padula model ensure? Similarly, what does the Biba model ensure?
 \end{enumerate}