Watch this video on YouTube
Which activity is most likely to increase the difficulty of completely eradicating undetected malicious code?