Figure 12.19  The Trojan horse dumps password
hashes and emails them across the Internet