@matthew_d_green OTOH, if you don't know how to actually do it you might not a) understand the threat and b) know how to defend against it.
-
-
Replying to @mattblaze
@mattblaze I don't object to the *idea* here. But you would ask your fresh MS students to do this outside of a supervised class??!2 replies 1 retweet 3 likes -
Replying to @matthew_d_green
@matthew_d_green I agree it's dangerous, especially unsupervised. absolutely.3 replies 1 retweet 1 like -
-
Replying to @SteveBellovin
@SteveBellovin@matthew_d_green I've been tempted by this project:"Everyone gets an F in this course, unless they do something about it."1 reply 2 retweets 4 likes -
Replying to @mattblaze
@mattblaze@matthew_d_green See slide 15 of https://www.cs.columbia.edu/~smb/classes/f13/l_intro.pdf …2 replies 0 retweets 0 likes -
Replying to @SteveBellovin
@mattblaze@matthew_d_green Once, though, when I gave an exploit homework assignment, a student tried to social engineer the computing staff2 replies 1 retweet 0 likes -
Replying to @SteveBellovin
@SteveBellovin@mattblaze Last year one of my students got in trouble for running a padding oracle program on JHU infrastructure...2 replies 3 retweets 2 likes -
Replying to @matthew_d_green
@SteveBellovin@mattblaze I made them a Dos and Don't slide.pic.twitter.com/OnFWHWmSyc
4 replies 1 retweet 4 likes -
@matthew_d_green not getting arrested is a high priority of mine as well
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.