Though we can easily perform to avoid some types of bugs, We are going to normally have bugs in software. And some of these bugs may expose a security vulnerability. Worse, If your bug is during the kernel, the complete method is compromised. In specified conditions, the use of automated technologies for the dissemination of written content can al