Which of the following are based on malicious code?