Damages from a compromised machine can be substantial. Compromised resources can be used by bots to send spam, participate in denial of service attacks, and enable the theft of protected data and intellectual property. In fact, it is not uncommon for a compromised machine to do all of these things.