We begin this discussion with a brief look at some of the ways in which malicious code tries to circumvent protection products and establish a foothold on a local computer. To better understand how to protect the desktop from malicious code, we will also discuss methods for identifying and...