2010 Second Cybercrime and Trustworthy Computing Workshop