INTERNET CLIENT VULNERABILITIES