Alternatively, the attacks may be of different types, such as an attempt to break into a user's account on target computer 404, coupled with the transmission of a ???Trojan horse??? program via electronic mail. (A ???Trojan horse,??? much like the famous Trojan horse of classical antiquity, is a computer program that appears useful, but actually contains hidden code with a harmful effect.) [0037]F