Figure 10.3 Make your own Trojan horse
applications with Silk Rope