From 67b4cd846ff88293d7cab9b75b04c4ccec3ac498 Mon Sep 17 00:00:00 2001 From: Lucca Christiansen <60967674+luccaflower@users.noreply.github.com> Date: Thu, 17 Oct 2024 09:57:16 +0200 Subject: [PATCH] fix typo --- coursepages/ostep/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/coursepages/ostep/README.md b/coursepages/ostep/README.md index 5f11ac9..2e1cded 100644 --- a/coursepages/ostep/README.md +++ b/coursepages/ostep/README.md @@ -162,7 +162,7 @@ The easiest way to do that is by watching a subset of the lectures from the *Com * [Machine-Level Programming V: Advanced Topics](https://scs.hosted.panopto.com/Panopto/Pages/Viewer.aspx?id=3f0bf9ca-d640-4798-b91a-73aed656a10a) * [Linking](https://scs.hosted.panopto.com/Panopto/Pages/Viewer.aspx?id=0aef84fc-a53b-49c6-bb43-14cb2b175249) -Further more, it is recommened to do the following labs. These labs are meant to teach you how to work with assembly: +Furthermore, it is recommened to do the following labs. These labs are meant to teach you how to work with assembly: * **Bomb Lab**: [Writeup](http://csapp.cs.cmu.edu/3e/bomblab.pdf), [self-study handout](https://csapp.cs.cmu.edu/3e/bomb.tar). > A "binary bomb" is a program provided to students as an object code file. When run, it prompts the user to type in 6 different strings. If any of these is incorrect, the bomb "explodes," printing an error message and logging the event on a grading server. Students must "defuse" their own unique bomb by disassembling and reverse engineering the program to determine what the 6 strings should be. The lab teaches students to understand assembly language, and also forces them to learn how to use a debugger. It's also great fun. A legendary lab among the CMU undergrads. * **Attack Lab**: [Writeup](http://csapp.cs.cmu.edu/3e/attacklab.pdf), [self-study handout](https://csapp.cs.cmu.edu/3e/target1.tar).