Watch this video on YouTube
In a well-controlled environment, which activity is most likely to introduce weaknesses in security software?