Lecture 7: Malicious Software II