This article outlines the process of reverse engineering hostile code.