. . . . "This may include write protecting, removing, or otherwise disabling the authentication code or the module, program or other information used to generate additional authentication codes, for example." . .