click
for full size |
spreading across the Internet using email, instant messaging or peer-to-peer file sharing networks;
using a trick - known as "social engineering" - to get you to open the email or run the file, which installs the worm on your computer and activates it;
installing one or several files on your computer, often masquerading as system files, or with randomly generated names to make removal more difficult;
installing entries in the system registry a
|