How To Identify Malicious Code