Figure 10.3 Make your own Trojan horse applications with Silk Rope