. "or other malicious code, and through techniques such as reducing the aggregate" . . .