Network Security Assignments Winter Term 2013



Similar documents
Marcum LLP MFT Guide

CafePilot has 3 components: the Client, Server and Service Request Monitor (or SRM for short).

DEPARTMENT OF INFORMATION SCIENCE. INFO221 Application Software Development COURSE OUTLINE

Assignment 4 CPSC 217 L02 Purpose. Important Note. Data visualization

E-LEARNING STUDENT S MANUAL

See the installation page

Using Subversion in Computer Science

Beginning with SubclipseSVN

Reflective Writing. How do you write reflectively? Stages of reflective thinking

1. After installing you can launch the program by clicking on the Start button and then select Programs, then WS_FTP LE, and then WS_FTP LE.

STUDENT PORTAL - TURNITIN

How To Run A Hello World On Android (Jdk) On A Microsoft Ds.Io (Windows) Or Android Or Android On A Pc Or Android 4 (

3-5: Downloading Your Client Portal. 6: Logging In To Your Account. 7: Uploading New Account Spreadsheets & Documents 8-11: Viewing & Noting Consumer

Summer 2015 Human Resource Administration Syllabus

Insurance claims through ClaimConnect (Dentxchange.com) using your Data Team Program.

How to IT. TUM IT services. October 9th, () How to IT October 9th, / 14

Technology Business Solutions. Online Backup Manager INSTALLATION

RNPP: Remote NotePad Protocol. Computer Networking Program. Protocol Specifications. October Prepared for

ONLINE EXERCISE SYSTEM A Web-Based Tool for Administration and Automatic Correction of Exercises

Education with no limits.

MAC 1105 FLEX SYLLABUS

Q&A. DEMO Version

Android: Setup Hello, World: Android Edition. due by noon ET on Wed 2/22. Ingredients.

Technical notes on online applications

Google App Engine f r o r J av a a v a (G ( AE A / E J / )

Tutorial. Reference for more thorough Mininet walkthrough if desired

The Consumer s guide to Web Developers

Keepit command-line client

Livezilla How to Install on Shared Hosting By: Jon Manning

Transferring Files to the CU2 Global Secure FTP Site. Login & Access Application Preparation Guide.

BlueJ Teamwork Tutorial

Version Control. Version Control

Instructions for Accessing the Advanced Computing Facility Supercomputing Cluster at the University of Kansas

Secure Global Desktop (SGD)

enter the administrator user name and password for that domain.

To begin, visit this URL:

Software Quality Exercise 2

Computer Science 1015F ~ 2010 ~ Notes to Students

1z0-102 Q&A. DEMO Version

Student User Guide. Introduction to the Module Management System (MMS) in Philosophy. Logging in; Submitting work; Logging out

The Subversion move/migrate from one server to another, shall be divided into 3 steps: Backup Create Import

Using SVN to Manage Source RTL

Online Test Administrator Quick Reference Guide Updated 08/02/2012 v.2.0

*Syllabus is always subject to change*

Introduction to General Psychology Spring 2014 PSY , Mon. & Wed.: 6-7:15

NLP Programming Tutorial 0 - Programming Basics

EXAM 1, SPRING ANSWER KEY

Examination Regulations

Human Translation Server

Use Subversion with GlassFishESB, OpenESB or Java CAPS 6

School of Social Work and Human Services. Assessment Policies

City Tech Instructional Technology & Media Services. Blackboard Tutorial for Students

Version Control with Subversion

Advanced Digital Imaging

How To Install An Org Vm Server On A Virtual Box On An Ubuntu (Orchestra) On A Windows Box On A Microsoft Zephyrus (Orroster) 2.5 (Orner)

Signiant Agent installation

How To Use Turna 4Europe Online Education And Training Programmes Online (Eu)

Using Windows Task Scheduler instead of the Backup Express Scheduler

Building OWASP ZAP Using Eclipse IDE

South East of Process Main Building / 1F. North East of Process Main Building / 1F. At 14:05 April 16, Sample not collected

Lab 2 : Basic File Server. Introduction

ELF WP 2 UML repository instruction

CREDENTIAL MANAGER IN WINDOWS 7

DreamFactory Security Whitepaper Customer Information about Privacy and Security

TUMonline The service portal for study and teaching

GUIDE TO A SUCCESSFUL ONLINE PRE-REGISTRATION AT THE UNIVERSITY OF VIENNA (FOR ERASMUS STUDENTS)

GENERAL FILE TRANSFER GUIDELINES

CS5331 Web Security - Assignment 0

Instructions for accessing new online Research Degree Forms - Staff

Dove User Guide Copyright Virgil Trasca

MAKING THE MOST OF PARENT-TEACHER CONFERENCES

1Z Oracle Weblogic Server 11g: System Administration I. Version: Demo. Page <<1/7>>

Erie 1 BOCES/WNYRIC. Secure File Transfer. Upload/Download Wizard

CARING IN PLACE WEB USER GUIDE

Tableau Server Trusted Authentication

DevKey Documentation. Release 0.1. Colm O Connor

INF 111 / CSE 121. Homework 4: Subversion Due Tuesday, July 14, 2009

Post Exploitation. n00bpentesting.com

Backing up with Windows 7

MLIS 7700 Fall

My review of Webfaction

FreeConference SharePlus TM. Desktop Sharing User Guide. SharePlus TM Desktop Sharing User Guide

How to Use the Staff Directory Publisher to Update School Staff Directory Lists

pure::variants Transformer for Software Configuration Management Manual

Hadoop Tutorial. General Instructions

Setting Up Dreamweaver for FTP and Site Management

Quick Deployment Step-by-step instructions to deploy Oracle Big Data Lite Virtual Machine

Lab 0 (Setting up your Development Environment) Week 1

Creating Blackboard Test Imports with Respondus

Attendance Management

How to prepare and submit a proposal for EARLI 2015

Transcription:

Network Security Assignments Winter Term 2013 Ralph Holz, Heiko Niedermayer, Stefan Liebald Network Architectures and Services Technische Universität München 30 October 2013 Ralph Holz, Heiko Niedermayer, Stefan Liebald: Network Security Assignments Winter Term 2013 1

Purpose of assignments Assignments are an offer to: Deepen your understanding of the subject Get feedback on your exam-readiness Practice your programming skills Help you pass the exam! Method of choice: self-correction Ralph Holz, Heiko Niedermayer, Stefan Liebald: Network Security Assignments Winter Term 2013 2

A word on plagiarism In spirit of core ideas: Show your tutors you have understood the topic Show good scientific practice Intention of a reference or quote: Use particularly good wording by other author to make your point Supposed to help reflection, and your own argument Ralph Holz, Heiko Niedermayer, Stefan Liebald: Network Security Assignments Winter Term 2013 3

Plagiarism is a no-go Plagiarism is: Anything where you pretent some other person s thoughts are yours E.g.: complete copy, with or without reference does not matter! E.g.: translation If you really need to quote, make it explicit. If you quote entire solutions: not your thoughts, not your credits! Two-shot policy: 0cr first try, exclusion on 2nd Ralph Holz, Heiko Niedermayer, Stefan Liebald: Network Security Assignments Winter Term 2013 4

How to do the assignments well Guidelines: Answer always in your own words Quote/cite sparsely, and correctly No copy & paste ever Code must be your own Ralph Holz, Heiko Niedermayer, Stefan Liebald: Network Security Assignments Winter Term 2013 5

Assignment style There are two forms of tasks in assignments: Text questions (argument, computation etc.) Programming You get bonus if you meet these 2 conditions (BOTH): You achieve at least 50% of programming credits (P-Credits) You achieve at least 50% of text credits (T-Credits) Ralph Holz, Heiko Niedermayer, Stefan Liebald: Network Security Assignments Winter Term 2013 6

P-Credits You get P-Credits for programming 3-4 programming tasks total, usually 1 per assignment (1 week time) Often guided Python and Java are OK Attention: different length of assignments (more credits for longer ones!) Ralph Holz, Heiko Niedermayer, Stefan Liebald: Network Security Assignments Winter Term 2013 7

T-Credits Credits for solutions: Several text questions per assignment (1 week time) 1cr for any solution that is clearly an honest attempt at finding the right answer. Independently of correctness! But you need to show you thought about your answer. Then: tutorial hours with correct solutions presented Self-correction phase (2-3 days) 1 additional credit if you show where your solution was wrong, and how you get from the wrong solution to the right one. (and also 1cr if it was right in the first place, of course) Ralph Holz, Heiko Niedermayer, Stefan Liebald: Network Security Assignments Winter Term 2013 8

Subversion (SVN) You all have SVN accounts now SVN: http://svnbook.red-bean.com/ https://projects.net.in.tum.de/svn-tum/netsecw13 Account: your LRZ ID. E.g.: gu27jaf There is a corresponding directory where you have RW rights svn co --username LRZID https://projects.net.in.tum.de/svn-tum/netsecw13 Password: from your account Check in all your solutions as PDF (text questions) or code (programming) Upload only into directory for the respective assignment Upload only until the deadline Ralph Holz, Heiko Niedermayer, Stefan Liebald: Network Security Assignments Winter Term 2013 9

Teams You may form teams of exactly 2 persons Commit your solution to directory of one group member Leave a file with a note in the directory of the second member that states who the team was (give the LRZ IDs) Ralph Holz, Heiko Niedermayer, Stefan Liebald: Network Security Assignments Winter Term 2013 10

Linux Some questions will require Linux machines We will offer a canonical Virtual Machine Only software on this machine is canonical Use of your own machines is OK, but...... check you use the same software versions! Especially Python and Java versions! Run the Virtual Machine with VirtualBox Instructions follow Ralph Holz, Heiko Niedermayer, Stefan Liebald: Network Security Assignments Winter Term 2013 11

Questions? https://www.net.in.tum.de holz@net.in.tum.de Ralph Holz, Heiko Niedermayer, Stefan Liebald: Network Security Assignments Winter Term 2013 12