Which Of These Is Not A Method Used By Malware Toolbars