Binary file hws/hw07.pdf has changed
--- a/hws/hw07.tex Tue Nov 19 20:19:19 2013 +0000
+++ b/hws/hw07.tex Mon Nov 25 20:31:01 2013 +0000
@@ -22,14 +22,14 @@
for constructing a proof of the judgement. What do the premises look like?
-\item The informal meaning of the formula \mbox{$P\;\mapsto\;Q$} is `$P$ speaks for
-$Q$'. Give a definition for this formula in terms of $\textit{says}$.
+%\item The informal meaning of the formula \mbox{$P\;\mapsto\;Q$} is `$P$ speaks for
+%$Q$'. Give a definition for this formula in terms of $\textit{says}$.
-\item In Unix, what should be the general architecture of a network application that
-processes potentially hostile data from the Internet? (Hint: Focus on the fact that in Unix
-you can give different privileges to processes.)
+%\item In Unix, what should be the general architecture of a network application that
+%processes potentially hostile data from the Internet? (Hint: Focus on the fact that in Unix
+%you can give different privileges to processes.)
-\item Explain what are the differences between dictionary and brute forcing attacks against passwords.
+%\item Explain what are the differences between dictionary and brute forcing attacks against passwords.
\end{enumerate}
\end{document}