. . . " opening write-in information one at a time, limiting the number and types of characters that may be written in, and/or separating and/or ceasing to process registrations during the time period when voting is conducted. [0104] Thus it can be said that this approach seeks not only to limit the opportunities for malicious code to be inserted, but also to limit the code that can be inserted, e.g., by" .