Trustworthy Computing : Learning About Threats Over 10 Years–Part 5 - Init