<s>
In	O
cryptovirology	O
,	O
a	O
goat	B-Application
file	I-Application
is	O
a	O
sacrificial	O
program	B-Application
file	I-Application
used	O
in	O
computer	O
virus	O
testing	O
,	O
and	O
contains	O
a	O
copy	O
of	O
a	O
known	O
computer	O
virus	O
which	O
will	O
be	O
released	O
and	O
injected	O
into	O
the	O
machine	O
's	O
memory	B-General_Concept
when	O
the	O
file	O
is	O
executed	O
.	O
</s>
<s>
Goat	B-Application
files	I-Application
are	O
so	O
named	O
for	O
their	O
similar	O
use	O
to	O
the	O
sacrifice	O
of	O
a	O
goat	O
in	O
antiquity	O
-	O
the	O
file	O
is	O
lost	O
in	O
order	O
for	O
the	O
virus	O
to	O
be	O
studied	O
,	O
but	O
it	O
is	O
considered	O
a	O
minimal	O
loss	O
as	O
more	O
goat	B-Application
files	I-Application
can	O
easily	O
be	O
assimilated	O
.	O
</s>
