1.1.4. Checking Traffic for Malware