Computer Security gurus: How does one find an exploit?