. . . . . "Alternatively, the operations and methods disclosed herein may be embodied in whole or in part using hardware components, such as Application Specific Integrated Circuits (ASICs), state machines, controllers or other hardware components ordevices, or a combination of hardware, software, and firmware components.While the system and method for maintaining a propagation history of potentially harmful" .