MODULE 9 MEMORY CORRUPTION ATTACKS AND SECURITY CONFIGURATIONS