From: Mart Lubbers <mart@martlubbers.net>
Date: Thu, 8 Dec 2016 14:33:19 +0000 (+0100)
Subject: start second assignment
X-Git-Url: https://git.martlubbers.net/?a=commitdiff_plain;h=d9cf2aad020fdbd181233a055f78a2efd22ab47c;p=paefcais1617.git

start second assignment
---

diff --git a/assignment2/.gitignore b/assignment2/.gitignore
new file mode 100644
index 0000000..6ead008
--- /dev/null
+++ b/assignment2/.gitignore
@@ -0,0 +1,7 @@
+*.aux
+*.fmt
+*.log
+*.mlog
+*.pdf
+*.bbl
+*.blg
diff --git a/assignment2/Makefile b/assignment2/Makefile
new file mode 100644
index 0000000..9ddd8ec
--- /dev/null
+++ b/assignment2/Makefile
@@ -0,0 +1,24 @@
+DOC:=a
+LATEX:=pdflatex
+BIBTEX:=bibtex
+LATEXFLAGS:=-file-line-error -halt-on-error -no-shell-escape
+
+TEXS:=$(wildcard *.tex)
+
+.PHONY: all
+.SECONDARY: $(DOC).fmt
+
+all: $(DOC).pdf
+
+%.fmt: preamble.tex
+	$(LATEX) $(LATEXFLAGS) -ini -jobname="$(basename $@)" "&$(LATEX) $<\dump"
+
+%.pdf: %.tex %.fmt %.bib $(TEXS)
+	$(LATEX) $(LATEXFLAGS) $<
+	grep -q '^\\bibdata{' $(basename $<).aux && $(BIBTEX) $(basename $<) || true
+	$(LATEX) $(LATEXFLAGS) $< | tee $(basename $<).mlog
+	grep -qF 'Please rerun LaTeX.' $(basename $<).mlog &&\
+		$(LATEX) $(LATEXFLAGS) $< || true
+
+clean:
+	$(RM) $(addprefix $(DOC).,aux log fmt toc bbl blg mlog run.xml out pdf)
diff --git a/assignment2/a.bib b/assignment2/a.bib
new file mode 100644
index 0000000..e69de29
diff --git a/assignment2/a.tex b/assignment2/a.tex
new file mode 100644
index 0000000..bf66c91
--- /dev/null
+++ b/assignment2/a.tex
@@ -0,0 +1,23 @@
+%&a
+\begin{document}
+\maketitle
+\section{Grey Hat Cracking Should Be Legalized}
+
+\section{Web Scrapers and Robot Denial Files}
+
+\section{An Immune System for the Internet}
+The idea of benevolent viruses patching security holes is a outright terrible
+idea because of a set of reasons.
+
+Firstly this breaches the privacy of the user. Analogous, a burglar that breaks
+into a house to install better locks would be considered wrong as well. The
+system is property of the user and the internet has been an anarchistic place
+that had no rules and regulations. If the user chooses not to protect their
+system then that is their own loss. However, when the system also attacks other
+systems it should be fixed. This is not always the case and depending on the
+view on the internet of the user breaking into the system is worse then a
+possible attack on the system. This case is a living example of the security
+versus privacy duality. Unprotected users are unwanted invaded by, apparently
+benevolent, worms. Who can proof these worms are benevolent, who develops them,
+those questions become very relevant.
+\end{document}
diff --git a/assignment2/preamble.tex b/assignment2/preamble.tex
new file mode 100644
index 0000000..7e34da8
--- /dev/null
+++ b/assignment2/preamble.tex
@@ -0,0 +1,9 @@
+\documentclass[a4paper]{article}
+
+\usepackage[british]{babel}
+\usepackage{geometry}
+
+\author{Mart Lubbers\\\small{s4109503}}
+\date{\today}
+\title{Assignment 2: Elaborating on three discussion topics\\
+	\small{Philosophy and Ethics of Computer and Information Sciences}}