Systems Exploits and Intrusion Detection