From: Mart Lubbers Date: Thu, 8 Dec 2016 14:33:19 +0000 (+0100) Subject: start second assignment X-Git-Url: https://git.martlubbers.net/?a=commitdiff_plain;h=d9cf2aad020fdbd181233a055f78a2efd22ab47c;p=paefcais1617.git start second assignment --- diff --git a/assignment2/.gitignore b/assignment2/.gitignore new file mode 100644 index 0000000..6ead008 --- /dev/null +++ b/assignment2/.gitignore @@ -0,0 +1,7 @@ +*.aux +*.fmt +*.log +*.mlog +*.pdf +*.bbl +*.blg diff --git a/assignment2/Makefile b/assignment2/Makefile new file mode 100644 index 0000000..9ddd8ec --- /dev/null +++ b/assignment2/Makefile @@ -0,0 +1,24 @@ +DOC:=a +LATEX:=pdflatex +BIBTEX:=bibtex +LATEXFLAGS:=-file-line-error -halt-on-error -no-shell-escape + +TEXS:=$(wildcard *.tex) + +.PHONY: all +.SECONDARY: $(DOC).fmt + +all: $(DOC).pdf + +%.fmt: preamble.tex + $(LATEX) $(LATEXFLAGS) -ini -jobname="$(basename $@)" "&$(LATEX) $<\dump" + +%.pdf: %.tex %.fmt %.bib $(TEXS) + $(LATEX) $(LATEXFLAGS) $< + grep -q '^\\bibdata{' $(basename $<).aux && $(BIBTEX) $(basename $<) || true + $(LATEX) $(LATEXFLAGS) $< | tee $(basename $<).mlog + grep -qF 'Please rerun LaTeX.' $(basename $<).mlog &&\ + $(LATEX) $(LATEXFLAGS) $< || true + +clean: + $(RM) $(addprefix $(DOC).,aux log fmt toc bbl blg mlog run.xml out pdf) diff --git a/assignment2/a.bib b/assignment2/a.bib new file mode 100644 index 0000000..e69de29 diff --git a/assignment2/a.tex b/assignment2/a.tex new file mode 100644 index 0000000..bf66c91 --- /dev/null +++ b/assignment2/a.tex @@ -0,0 +1,23 @@ +%&a +\begin{document} +\maketitle +\section{Grey Hat Cracking Should Be Legalized} + +\section{Web Scrapers and Robot Denial Files} + +\section{An Immune System for the Internet} +The idea of benevolent viruses patching security holes is a outright terrible +idea because of a set of reasons. + +Firstly this breaches the privacy of the user. Analogous, a burglar that breaks +into a house to install better locks would be considered wrong as well. The +system is property of the user and the internet has been an anarchistic place +that had no rules and regulations. If the user chooses not to protect their +system then that is their own loss. However, when the system also attacks other +systems it should be fixed. This is not always the case and depending on the +view on the internet of the user breaking into the system is worse then a +possible attack on the system. This case is a living example of the security +versus privacy duality. Unprotected users are unwanted invaded by, apparently +benevolent, worms. Who can proof these worms are benevolent, who develops them, +those questions become very relevant. +\end{document} diff --git a/assignment2/preamble.tex b/assignment2/preamble.tex new file mode 100644 index 0000000..7e34da8 --- /dev/null +++ b/assignment2/preamble.tex @@ -0,0 +1,9 @@ +\documentclass[a4paper]{article} + +\usepackage[british]{babel} +\usepackage{geometry} + +\author{Mart Lubbers\\\small{s4109503}} +\date{\today} +\title{Assignment 2: Elaborating on three discussion topics\\ + \small{Philosophy and Ethics of Computer and Information Sciences}}