exploit hacking heap overflow hack hacker computer security firewall information security penetration testing antivirus security network security buffer overflow linux