How Can Malicious Code Be Damaged