Fig 7.6 Placing a backdoor using buffer overflows, TFTP, and Netcat