start second assignment
authorMart Lubbers <mart@martlubbers.net>
Thu, 8 Dec 2016 14:33:19 +0000 (15:33 +0100)
committerMart Lubbers <mart@martlubbers.net>
Thu, 8 Dec 2016 14:33:19 +0000 (15:33 +0100)
assignment2/.gitignore [new file with mode: 0644]
assignment2/Makefile [new file with mode: 0644]
assignment2/a.bib [new file with mode: 0644]
assignment2/a.tex [new file with mode: 0644]
assignment2/preamble.tex [new file with mode: 0644]

diff --git a/assignment2/.gitignore b/assignment2/.gitignore
new file mode 100644 (file)
index 0000000..6ead008
--- /dev/null
@@ -0,0 +1,7 @@
+*.aux
+*.fmt
+*.log
+*.mlog
+*.pdf
+*.bbl
+*.blg
diff --git a/assignment2/Makefile b/assignment2/Makefile
new file mode 100644 (file)
index 0000000..9ddd8ec
--- /dev/null
@@ -0,0 +1,24 @@
+DOC:=a
+LATEX:=pdflatex
+BIBTEX:=bibtex
+LATEXFLAGS:=-file-line-error -halt-on-error -no-shell-escape
+
+TEXS:=$(wildcard *.tex)
+
+.PHONY: all
+.SECONDARY: $(DOC).fmt
+
+all: $(DOC).pdf
+
+%.fmt: preamble.tex
+       $(LATEX) $(LATEXFLAGS) -ini -jobname="$(basename $@)" "&$(LATEX) $<\dump"
+
+%.pdf: %.tex %.fmt %.bib $(TEXS)
+       $(LATEX) $(LATEXFLAGS) $<
+       grep -q '^\\bibdata{' $(basename $<).aux && $(BIBTEX) $(basename $<) || true
+       $(LATEX) $(LATEXFLAGS) $< | tee $(basename $<).mlog
+       grep -qF 'Please rerun LaTeX.' $(basename $<).mlog &&\
+               $(LATEX) $(LATEXFLAGS) $< || true
+
+clean:
+       $(RM) $(addprefix $(DOC).,aux log fmt toc bbl blg mlog run.xml out pdf)
diff --git a/assignment2/a.bib b/assignment2/a.bib
new file mode 100644 (file)
index 0000000..e69de29
diff --git a/assignment2/a.tex b/assignment2/a.tex
new file mode 100644 (file)
index 0000000..bf66c91
--- /dev/null
@@ -0,0 +1,23 @@
+%&a
+\begin{document}
+\maketitle
+\section{Grey Hat Cracking Should Be Legalized}
+
+\section{Web Scrapers and Robot Denial Files}
+
+\section{An Immune System for the Internet}
+The idea of benevolent viruses patching security holes is a outright terrible
+idea because of a set of reasons.
+
+Firstly this breaches the privacy of the user. Analogous, a burglar that breaks
+into a house to install better locks would be considered wrong as well. The
+system is property of the user and the internet has been an anarchistic place
+that had no rules and regulations. If the user chooses not to protect their
+system then that is their own loss. However, when the system also attacks other
+systems it should be fixed. This is not always the case and depending on the
+view on the internet of the user breaking into the system is worse then a
+possible attack on the system. This case is a living example of the security
+versus privacy duality. Unprotected users are unwanted invaded by, apparently
+benevolent, worms. Who can proof these worms are benevolent, who develops them,
+those questions become very relevant.
+\end{document}
diff --git a/assignment2/preamble.tex b/assignment2/preamble.tex
new file mode 100644 (file)
index 0000000..7e34da8
--- /dev/null
@@ -0,0 +1,9 @@
+\documentclass[a4paper]{article}
+
+\usepackage[british]{babel}
+\usepackage{geometry}
+
+\author{Mart Lubbers\\\small{s4109503}}
+\date{\today}
+\title{Assignment 2: Elaborating on three discussion topics\\
+       \small{Philosophy and Ethics of Computer and Information Sciences}}