The Seven Habits of Highly Insecure Software