Please remember to print your answer for each day's paper question on a sheet of paper and hand it in at the beginning of class.
How could an adversary circumvent Backtracker, so that an administrator cannot pinpoint the initial intrusion point?
Questions or comments regarding 6.858? Send e-mail to the course staff at 6.858-staff@pdos.csail.mit.edu.
Top // 6.858 home // Last updated Friday, 29-Jan-2016 11:49:25 EST