A couple of years ago, I worked on a computer security report. I learned about common flaws in programs, and created a couple of exploits using different techniques. It is good to know about those issues in order to create secure programs.
Following is a list of the articles I wrote:
Also I did a quick test on WEP security: