How to Prevent Software Exploitation