"seventh program instructions, responsive to the sixth program instructions determining that the packet is a new, exploit candidate, to determine a signature of the packet or a sequence of packets including the first the packet, and report the new, exploit candidate and the signature to an administrator; and wherein" . . . .