Malware authors also use obfuscation to help make destructive code tougher to study, which hampers close scrutiny by people and protection software program.EXCEPTION: If an app about the Limited applications list is usually a member of a Restricted application team, the actions configured for things to do inside the Limited application team overrid