Security Exploiting Overflows. Introduction r See the following link for more info: operating-systems-and-applications-in-