Fig. 1 | Journal of Computer Virology and Hacking Techniques