1.Encrypt every process’ executable
2.Setuid important processes to the root user
3.Limit system calls to administrators
4.Check all system calls for error conditions
Answer:4