What are some of the characteristics and operations of some of the malicious software that exists today?