Paper on exploiting security issues in client and other non-server software. Includes a sample exploit against tar.