Exploits 2: Exploitation in the Windows Environment