Lecture 6: Malicious Software I