Reverse Shells How Hackers take over computers with Reverse Shells Web Security is about Preventing Naivety