Faxploit: How can sending a fax compromise a network?