Exploitation: Buffer Overflow, SQL injection, Adobe files
Source:
http://xkcd.com/327/
Next slide
Back to first slide
View graphic version