n.These programs are often called 'exploits' and usually come as a source code instead of as a binary file. Let me explain: a binary file is any file that isn't made of text. Executable files are usually binary files. Now, in our case, programs come as sources instead of binary. Sources are in the form of plain text, and they're actually a bunch of commands. When given to a compiler, this source code turns into an executable binary (except for source codes written in the Perl programming language, which can be executed in the form of sources if you have the right program). Anyway, these programs come in the form of sources so you will be able to understand how they work instead of blindly running them.Searching Security Focus++++++++++++++++++++++++Security Focus offers more organized information. Instead of various bits of information, Security Focus offers articles. These include exact definitions of the bug, where and when it should happen, work-arounds (how to solve it) etc'. The only backdrop in Security Focus is that it is smaller than other databases.BugTraq+++++++Ah... my favorite database. When people post something to BugTraq about a security hole they found, other people can reply to them and share their side of the story. For example: did it work on their computer too, how to fix the bug in various ways, what causes the bug in the first place etc'. You can compile a full database with all of the necessary information by simply reading a couple of posts.Getting Caught**************If you're planning on doing something bad, please don't. You can get caught. Better crackers than you already got caught. Don't be stupid.Okay, so I can hack a host which runs Sendmail. Now how do I do it?===================================================================I have made a nice list with several security holes regarding Sendmail just to give you the hang of it.A Local DoS(29) in All Sendmail Versions Up to 8.9.3 (taken from Packet Storm)...