A method and/or system and/or apparatus providing deception and/or
execution alteration in an information system. In specific embodiments,
deceptions and/or protections are provided by intercepting and/or
modifying operation of one or more system calls of an operating system.