These examples are taken from Gera's "Insecure Programming by example" page and have been compiled for you as challenges. Visit his page for further information (http://community.corest.com/~gera/InsecureProgramming/). The files are part of the free training packages at http://www.binary-auditing.com