Proactive approaches to finding vulnerable machines Copyright 2000, Massachusetts Institute of Technology. All rights reserved.