Fig 7.6 Placing a backdoor using buffer
overflows, TFTP, and Netcat