Figure 1:
Corruptive memory access.
Back to Article