6 Techniques used by malware composers

>