Source: https://repo.zenk-security.com/Magazine E-book/Hacking- The Art of Exploitation (2nd ed. 2008) - Erickson.pdf