1) Why is badmail setgid instead of setuid? Put another way, what problem am I avoiding by that choice? (Hint: what privileges does the owner of a file have?) 2) Programs like ftpd switch between privileged and unprivileged mode, depending on what they're doing. Binding to privileged sockets requires root permissions; opening files for a user requires user permissions. Should the program run as root most of the time, and only assume user privileges as needed, or should it run as the user most of the time, and only assume root as needed? Explain. 3) Suppose that all cryptographic keys were stored in a separate machine on the network. To use a key, you have to contact this machine. Is this a good or a bad idea? Explain? 4) Explain the advantages and disadvantages of a public hacking contest as a form of "tiger team".