Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...